OPENSUSE-SU-2026:10301-1

Vulnerability from csaf_opensuse - Published: 2026-03-07 00:00 - Updated: 2026-03-07 00:00
Summary
kernel-devel-longterm-6.18.16-1.1 on GA media

Notes

Title of the patch
kernel-devel-longterm-6.18.16-1.1 on GA media
Description of the patch
These are all security issues fixed in the kernel-devel-longterm-6.18.16-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2026-10301
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "kernel-devel-longterm-6.18.16-1.1 on GA media",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "These are all security issues fixed in the kernel-devel-longterm-6.18.16-1.1 package on the GA media of openSUSE Tumbleweed.",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-Tumbleweed-2026-10301",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10301-1.json"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-28956 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-28956/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-39991 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-39991/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-39992 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-39992/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-39993 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-39993/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-39994 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-39994/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-39995 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-39995/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-39996 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-39996/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-39997 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-39997/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-39998 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-39998/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-39999 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-39999/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40000 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40000/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40001 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40001/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40002 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40002/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40003 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40003/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40004 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40004/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40013 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40013/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40015 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40015/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40016 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40016/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40017 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40017/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40018 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40018/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40019 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40019/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40025 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40025/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40026 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40026/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40027 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40027/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40028 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40028/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40029 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40029/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40030 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40030/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40031 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40031/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40032 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40032/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40033 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40033/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40034 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40034/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40035 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40035/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40036 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40036/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40037 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40037/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40038 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40038/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40039 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40039/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40040 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40040/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40041 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40041/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40042 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40042/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40043 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40043/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40044 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40044/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40045 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40045/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40046 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40046/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40047 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40047/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40048 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40048/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40049 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40049/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40050 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40050/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40051 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40051/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40052 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40052/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40053 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40053/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40054 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40054/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40055 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40055/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40056 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40056/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40057 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40057/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40058 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40058/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40059 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40059/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40060 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40060/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40061 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40061/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40062 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40062/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40063 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40063/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40064 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40064/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40065 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40065/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40066 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40066/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40067 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40067/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40068 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40068/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40069 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40069/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40070 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40070/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40071 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40071/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40072 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40072/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40073 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40073/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40074 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40074/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40075 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40075/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40076 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40076/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40077 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40077/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40078 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40078/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40079 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40079/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40080 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40080/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40081 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40081/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40082 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40082/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40084 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40084/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40085 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40085/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40086 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40086/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40087 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40087/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40088 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40088/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40089 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40089/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40090 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40090/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40091 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40091/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40092 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40092/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40093 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40093/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40094 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40094/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40095 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40095/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40096 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40096/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40097 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40097/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40098 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40098/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40099 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40099/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40100 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40100/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40101 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40101/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40102 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40102/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40103 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40103/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40104 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40104/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40105 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40105/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40106 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40106/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40300 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40300/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68254 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68254/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68255 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68255/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68256 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68256/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68257 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68257/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68258 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68258/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68259 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68259/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68260 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68260/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68261 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68261/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68262 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68262/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68263 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68263/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68264 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68264/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68323 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68323/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68324 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68324/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68325 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68325/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68332 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68332/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68335 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68335/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68336 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68336/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68337 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68337/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68344 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68344/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68345 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68345/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68346 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68346/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68347 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68347/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68348 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68348/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68349 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68349/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68350 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68350/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68351 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68351/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68352 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68352/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68353 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68353/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68354 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68354/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68355 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68355/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68356 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68356/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68357 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68357/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68358 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68358/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68359 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68359/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68360 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68360/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68361 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68361/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68362 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68362/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68363 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68363/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68364 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68364/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68365 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68365/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68366 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68366/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68367 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68367/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68368 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68368/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68369 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68369/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68370 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68370/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68371 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68371/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68372 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68372/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68373 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68373/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68374 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68374/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68375 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68375/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68376 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68376/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68377 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68377/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68378 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68378/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68379 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68379/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68380 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68380/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68724 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68724/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68725 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68725/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68726 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68726/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68727 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68727/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68728 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68728/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68729 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68729/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68730 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68730/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68731 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68731/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68732 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68732/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68733 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68733/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68735 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68735/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68736 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68736/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68737 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68737/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68738 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68738/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68739 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68739/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68740 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68740/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68741 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68741/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68742 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68742/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68743 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68743/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68744 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68744/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68745 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68745/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68746 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68746/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68747 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68747/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68748 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68748/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68749 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68749/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68751 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68751/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68752 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68752/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68753 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68753/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68754 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68754/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68755 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68755/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68756 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68756/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68757 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68757/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68758 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68758/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68759 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68759/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68760 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68760/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68761 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68761/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68762 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68762/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68763 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68763/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68764 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68764/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68765 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68765/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68766 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68766/"
      }
    ],
    "title": "kernel-devel-longterm-6.18.16-1.1 on GA media",
    "tracking": {
      "current_release_date": "2026-03-07T00:00:00Z",
      "generator": {
        "date": "2026-03-07T00:00:00Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2026:10301-1",
      "initial_release_date": "2026-03-07T00:00:00Z",
      "revision_history": [
        {
          "date": "2026-03-07T00:00:00Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-longterm-6.18.16-1.1.aarch64",
                "product": {
                  "name": "kernel-devel-longterm-6.18.16-1.1.aarch64",
                  "product_id": "kernel-devel-longterm-6.18.16-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-longterm-6.18.16-1.1.aarch64",
                "product": {
                  "name": "kernel-source-longterm-6.18.16-1.1.aarch64",
                  "product_id": "kernel-source-longterm-6.18.16-1.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-longterm-6.18.16-1.1.ppc64le",
                "product": {
                  "name": "kernel-devel-longterm-6.18.16-1.1.ppc64le",
                  "product_id": "kernel-devel-longterm-6.18.16-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-longterm-6.18.16-1.1.ppc64le",
                "product": {
                  "name": "kernel-source-longterm-6.18.16-1.1.ppc64le",
                  "product_id": "kernel-source-longterm-6.18.16-1.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-longterm-6.18.16-1.1.s390x",
                "product": {
                  "name": "kernel-devel-longterm-6.18.16-1.1.s390x",
                  "product_id": "kernel-devel-longterm-6.18.16-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-longterm-6.18.16-1.1.s390x",
                "product": {
                  "name": "kernel-source-longterm-6.18.16-1.1.s390x",
                  "product_id": "kernel-source-longterm-6.18.16-1.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-longterm-6.18.16-1.1.x86_64",
                "product": {
                  "name": "kernel-devel-longterm-6.18.16-1.1.x86_64",
                  "product_id": "kernel-devel-longterm-6.18.16-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-longterm-6.18.16-1.1.x86_64",
                "product": {
                  "name": "kernel-source-longterm-6.18.16-1.1.x86_64",
                  "product_id": "kernel-source-longterm-6.18.16-1.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Tumbleweed",
                "product": {
                  "name": "openSUSE Tumbleweed",
                  "product_id": "openSUSE Tumbleweed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:tumbleweed"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-longterm-6.18.16-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64"
        },
        "product_reference": "kernel-devel-longterm-6.18.16-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-longterm-6.18.16-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le"
        },
        "product_reference": "kernel-devel-longterm-6.18.16-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-longterm-6.18.16-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x"
        },
        "product_reference": "kernel-devel-longterm-6.18.16-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-longterm-6.18.16-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64"
        },
        "product_reference": "kernel-devel-longterm-6.18.16-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-longterm-6.18.16-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64"
        },
        "product_reference": "kernel-source-longterm-6.18.16-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-longterm-6.18.16-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le"
        },
        "product_reference": "kernel-source-longterm-6.18.16-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-longterm-6.18.16-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x"
        },
        "product_reference": "kernel-source-longterm-6.18.16-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-longterm-6.18.16-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        },
        "product_reference": "kernel-source-longterm-6.18.16-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-28956",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-28956"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-28956",
          "url": "https://www.suse.com/security/cve/CVE-2024-28956"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1242006 for CVE-2024-28956",
          "url": "https://bugzilla.suse.com/1242006"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-28956"
    },
    {
      "cve": "CVE-2025-39991",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-39991"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load()\n\nIf ab-\u003efw.m3_data points to data, then fw pointer remains null.\nFurther, if m3_mem is not allocated, then fw is dereferenced to be\npassed to ath11k_err function.\n\nReplace fw-\u003esize by m3_len.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-39991",
          "url": "https://www.suse.com/security/cve/CVE-2025-39991"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252075 for CVE-2025-39991",
          "url": "https://bugzilla.suse.com/1252075"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-39991"
    },
    {
      "cve": "CVE-2025-39992",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-39992"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: swap: check for stable address space before operating on the VMA\n\nIt is possible to hit a zero entry while traversing the vmas in unuse_mm()\ncalled from swapoff path and accessing it causes the OOPS:\n\nUnable to handle kernel NULL pointer dereference at virtual address\n0000000000000446--\u003e Loading the memory from offset 0x40 on the\nXA_ZERO_ENTRY as address.\nMem abort info:\n  ESR = 0x0000000096000005\n  EC = 0x25: DABT (current EL), IL = 32 bits\n  SET = 0, FnV = 0\n  EA = 0, S1PTW = 0\n  FSC = 0x05: level 1 translation fault\n\nThe issue is manifested from the below race between the fork() on a\nprocess and swapoff:\nfork(dup_mmap())\t\t\tswapoff(unuse_mm)\n---------------                         -----------------\n1) Identical mtree is built using\n   __mt_dup().\n\n2) copy_pte_range()--\u003e\n\tcopy_nonpresent_pte():\n       The dst mm is added into the\n    mmlist to be visible to the\n    swapoff operation.\n\n3) Fatal signal is sent to the parent\nprocess(which is the current during the\nfork) thus skip the duplication of the\nvmas and mark the vma range with\nXA_ZERO_ENTRY as a marker for this process\nthat helps during exit_mmap().\n\n\t\t\t\t     4) swapoff is tried on the\n\t\t\t\t\t\u0027mm\u0027 added to the \u0027mmlist\u0027 as\n\t\t\t\t\tpart of the 2.\n\n\t\t\t\t     5) unuse_mm(), that iterates\n\t\t\t\t\tthrough the vma\u0027s of this \u0027mm\u0027\n\t\t\t\t\twill hit the non-NULL zero entry\n\t\t\t\t\tand operating on this zero entry\n\t\t\t\t\tas a vma is resulting into the\n\t\t\t\t\toops.\n\nThe proper fix would be around not exposing this partially-valid tree to\nothers when droping the mmap lock, which is being solved with [1].  A\nsimpler solution would be checking for MMF_UNSTABLE, as it is set if\nmm_struct is not fully initialized in dup_mmap().\n\nThanks to Liam/Lorenzo/David for all the suggestions in fixing this\nissue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-39992",
          "url": "https://www.suse.com/security/cve/CVE-2025-39992"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252076 for CVE-2025-39992",
          "url": "https://bugzilla.suse.com/1252076"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-39992"
    },
    {
      "cve": "CVE-2025-39993",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-39993"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: rc: fix races with imon_disconnect()\n\nSyzbot reports a KASAN issue as below:\nBUG: KASAN: use-after-free in __create_pipe include/linux/usb.h:1945 [inline]\nBUG: KASAN: use-after-free in send_packet+0xa2d/0xbc0 drivers/media/rc/imon.c:627\nRead of size 4 at addr ffff8880256fb000 by task syz-executor314/4465\n\nCPU: 2 PID: 4465 Comm: syz-executor314 Not tainted 6.0.0-rc1-syzkaller #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n__dump_stack lib/dump_stack.c:88 [inline]\ndump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\nprint_address_description mm/kasan/report.c:317 [inline]\nprint_report.cold+0x2ba/0x6e9 mm/kasan/report.c:433\nkasan_report+0xb1/0x1e0 mm/kasan/report.c:495\n__create_pipe include/linux/usb.h:1945 [inline]\nsend_packet+0xa2d/0xbc0 drivers/media/rc/imon.c:627\nvfd_write+0x2d9/0x550 drivers/media/rc/imon.c:991\nvfs_write+0x2d7/0xdd0 fs/read_write.c:576\nksys_write+0x127/0x250 fs/read_write.c:631\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\ndo_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nThe iMON driver improperly releases the usb_device reference in\nimon_disconnect without coordinating with active users of the\ndevice.\n\nSpecifically, the fields usbdev_intf0 and usbdev_intf1 are not\nprotected by the users counter (ictx-\u003eusers). During probe,\nimon_init_intf0 or imon_init_intf1 increments the usb_device\nreference count depending on the interface. However, during\ndisconnect, usb_put_dev is called unconditionally, regardless of\nactual usage.\n\nAs a result, if vfd_write or other operations are still in\nprogress after disconnect, this can lead to a use-after-free of\nthe usb_device pointer.\n\nThread 1 vfd_write                      Thread 2 imon_disconnect\n                                        ...\n                                        if\n                                          usb_put_dev(ictx-\u003eusbdev_intf0)\n                                        else\n                                          usb_put_dev(ictx-\u003eusbdev_intf1)\n...\nwhile\n  send_packet\n    if\n      pipe = usb_sndintpipe(\n        ictx-\u003eusbdev_intf0) UAF\n    else\n      pipe = usb_sndctrlpipe(\n        ictx-\u003eusbdev_intf0, 0) UAF\n\nGuard access to usbdev_intf0 and usbdev_intf1 after disconnect by\nchecking ictx-\u003edisconnected in all writer paths. Add early return\nwith -ENODEV in send_packet(), vfd_write(), lcd_write() and\ndisplay_open() if the device is no longer present.\n\nSet and read ictx-\u003edisconnected under ictx-\u003elock to ensure memory\nsynchronization. Acquire the lock in imon_disconnect() before setting\nthe flag to synchronize with any ongoing operations.\n\nEnsure writers exit early and safely after disconnect before the USB\ncore proceeds with cleanup.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-39993",
          "url": "https://www.suse.com/security/cve/CVE-2025-39993"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252070 for CVE-2025-39993",
          "url": "https://bugzilla.suse.com/1252070"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-39993"
    },
    {
      "cve": "CVE-2025-39994",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-39994"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: tuner: xc5000: Fix use-after-free in xc5000_release\n\nThe original code uses cancel_delayed_work() in xc5000_release(), which\ndoes not guarantee that the delayed work item timer_sleep has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere xc5000_release() may free the xc5000_priv while timer_sleep is still\nactive and attempts to dereference the xc5000_priv.\n\nA typical race condition is illustrated below:\n\nCPU 0 (release thread)                 | CPU 1 (delayed work callback)\nxc5000_release()                       | xc5000_do_timer_sleep()\n  cancel_delayed_work()                |\n  hybrid_tuner_release_state(priv)     |\n    kfree(priv)                        |\n                                       |   priv = container_of() // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the timer_sleep is properly canceled before the xc5000_priv memory\nis deallocated.\n\nA deadlock concern was considered: xc5000_release() is called in a process\ncontext and is not holding any locks that the timer_sleep work item might\nalso need. Therefore, the use of the _sync() variant is safe here.\n\nThis bug was initially identified through static analysis.\n\n[hverkuil: fix typo in Subject: tunner -\u003e tuner]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-39994",
          "url": "https://www.suse.com/security/cve/CVE-2025-39994"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252072 for CVE-2025-39994",
          "url": "https://bugzilla.suse.com/1252072"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-39994"
    },
    {
      "cve": "CVE-2025-39995",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-39995"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in probe\n\nThe state-\u003etimer is a cyclic timer that schedules work_i2c_poll and\ndelayed_work_enable_hotplug, while rearming itself. Using timer_delete()\nfails to guarantee the timer isn\u0027t still running when destroyed, similarly\ncancel_delayed_work() cannot ensure delayed_work_enable_hotplug has\nterminated if already executing. During probe failure after timer\ninitialization, these may continue running as orphans and reference the\nalready-freed tc358743_state object through tc358743_irq_poll_timer.\n\nThe following is the trace captured by KASAN.\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800ded83c8 by task swapper/1/0\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __pfx_sched_balance_find_src_group+0x10/0x10\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? rcu_sched_clock_irq+0xb06/0x27d0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? try_to_wake_up+0xb15/0x1960\n ? tmigr_update_events+0x280/0x740\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n tmigr_handle_remote_up+0x603/0x7e0\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n ? sched_balance_trigger+0x98/0x9f0\n ? sched_tick+0x221/0x5a0\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n ? tick_nohz_handler+0x339/0x440\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n __walk_groups.isra.0+0x42/0x150\n tmigr_handle_remote+0x1f4/0x2e0\n ? __pfx_tmigr_handle_remote+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n ? hrtimer_interrupt+0x322/0x780\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\n\nAllocated by task 141:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n __kmalloc_node_track_caller_noprof+0x198/0x430\n devm_kmalloc+0x7b/0x1e0\n tc358743_probe+0xb7/0x610  i2c_device_probe+0x51d/0x880\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __device_attach_driver+0x174/0x220\n bus_for_each_drv+0x100/0x190\n __device_attach+0x206/0x370\n bus_probe_device+0x123/0x170\n device_add+0xd25/0x1470\n i2c_new_client_device+0x7a0/0xcd0\n do_one_initcall+0x89/0x300\n do_init_module+0x29d/0x7f0\n load_module+0x4f48/0x69e0\n init_module_from_file+0xe4/0x150\n idempotent_init_module+0x320/0x670\n __x64_sys_finit_module+0xbd/0x120\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFreed by task 141:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n release_nodes+0xa4/0x100\n devres_release_group+0x1b2/0x380\n i2c_device_probe+0x694/0x880\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __device_attach_driver+0x174/0x220\n bus_for_each_drv+0x100/0x190\n __device_attach+0x206/0x370\n bus_probe_device+0x123/0x170\n device_add+0xd25/0x1470\n i2c_new_client_device+0x7a0/0xcd0\n do_one_initcall+0x89/0x300\n do_init_module+0x29d/0x7f0\n load_module+0x4f48/0x69e0\n init_module_from_file+0xe4/0x150\n idempotent_init_module+0x320/0x670\n __x64_sys_finit_module+0xbd/0x120\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace timer_delete() with timer_delete_sync() and cancel_delayed_work()\nwith cancel_delayed_work_sync() to ensure proper termination of timer and\nwork items before resource cleanup.\n\nThis bug was initially identified through static analysis. For reproduction\nand testing, I created a functional emulation of the tc358743 device via a\nkernel module and introduced faults through the debugfs interface.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-39995",
          "url": "https://www.suse.com/security/cve/CVE-2025-39995"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252064 for CVE-2025-39995",
          "url": "https://bugzilla.suse.com/1252064"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-39995"
    },
    {
      "cve": "CVE-2025-39996",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-39996"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: b2c2: Fix use-after-free causing by irq_check_work in flexcop_pci_remove\n\nThe original code uses cancel_delayed_work() in flexcop_pci_remove(), which\ndoes not guarantee that the delayed work item irq_check_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere flexcop_pci_remove() may free the flexcop_device while irq_check_work\nis still active and attempts to dereference the device.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove)                         | CPU 1 (delayed work callback)\nflexcop_pci_remove()                   | flexcop_pci_irq_check_work()\n  cancel_delayed_work()                |\n  flexcop_device_kfree(fc_pci-\u003efc_dev) |\n                                       |   fc = fc_pci-\u003efc_dev; // UAF\n\nThis is confirmed by a KASAN report:\n\n==================================================================\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff8880093aa8c8 by task bash/135\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\n\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n __kmalloc_noprof+0x1be/0x460\n flexcop_device_kmalloc+0x54/0xe0\n flexcop_pci_probe+0x1f/0x9d0\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 135:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n flexcop_device_kfree+0x32/0x50\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing delayed\nwork has finished before the device memory is deallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the B2C2 FlexCop PCI device in QEMU and introduced\nartificial delays within the flexcop_pci_irq_check_work() function to\nincrease the likelihood of triggering the bug.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-39996",
          "url": "https://www.suse.com/security/cve/CVE-2025-39996"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252065 for CVE-2025-39996",
          "url": "https://bugzilla.suse.com/1252065"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-39996"
    },
    {
      "cve": "CVE-2025-39997",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-39997"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free\n\nThe previous commit 0718a78f6a9f (\"ALSA: usb-audio: Kill timer properly at\nremoval\") patched a UAF issue caused by the error timer.\n\nHowever, because the error timer kill added in this patch occurs after the\nendpoint delete, a race condition to UAF still occurs, albeit rarely.\n\nAdditionally, since kill-cleanup for urb is also missing, freed memory can\nbe accessed in interrupt context related to urb, which can cause UAF.\n\nTherefore, to prevent this, error timer and urb must be killed before\nfreeing the heap memory.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-39997",
          "url": "https://www.suse.com/security/cve/CVE-2025-39997"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252056 for CVE-2025-39997",
          "url": "https://bugzilla.suse.com/1252056"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-39997"
    },
    {
      "cve": "CVE-2025-39998",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-39998"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: target_core_configfs: Add length check to avoid buffer overflow\n\nA buffer overflow arises from the usage of snprintf to write into the\nbuffer \"buf\" in target_lu_gp_members_show function located in\n/drivers/target/target_core_configfs.c. This buffer is allocated with\nsize LU_GROUP_NAME_BUF (256 bytes).\n\nsnprintf(...) formats multiple strings into buf with the HBA name\n(hba-\u003ehba_group.cg_item), a slash character, a devicename (dev-\u003e\ndev_group.cg_item) and a newline character, the total formatted string\nlength may exceed the buffer size of 256 bytes.\n\nSince snprintf() returns the total number of bytes that would have been\nwritten (the length of %s/%sn ), this value may exceed the buffer length\n(256 bytes) passed to memcpy(), this will ultimately cause function\nmemcpy reporting a buffer overflow error.\n\nAn additional check of the return value of snprintf() can avoid this\nbuffer overflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-39998",
          "url": "https://www.suse.com/security/cve/CVE-2025-39998"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252073 for CVE-2025-39998",
          "url": "https://bugzilla.suse.com/1252073"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-39998"
    },
    {
      "cve": "CVE-2025-39999",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-39999"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblk-mq: fix blk_mq_tags double free while nr_requests grown\n\nIn the case user trigger tags grow by queue sysfs attribute nr_requests,\nhctx-\u003esched_tags will be freed directly and replaced with a new\nallocated tags, see blk_mq_tag_update_depth().\n\nThe problem is that hctx-\u003esched_tags is from elevator-\u003eet-\u003etags, while\net-\u003etags is still the freed tags, hence later elevator exit will try to\nfree the tags again, causing kernel panic.\n\nFix this problem by replacing et-\u003etags with new allocated tags as well.\n\nNoted there are still some long term problems that will require some\nrefactor to be fixed thoroughly[1].\n\n[1] https://lore.kernel.org/all/20250815080216.410665-1-yukuai1@huaweicloud.com/",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-39999",
          "url": "https://www.suse.com/security/cve/CVE-2025-39999"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252059 for CVE-2025-39999",
          "url": "https://bugzilla.suse.com/1252059"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-39999"
    },
    {
      "cve": "CVE-2025-40000",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40000"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait()\n\nThere is a bug observed when rtw89_core_tx_kick_off_and_wait() tries to\naccess already freed skb_data:\n\n BUG: KFENCE: use-after-free write in rtw89_core_tx_kick_off_and_wait drivers/net/wireless/realtek/rtw89/core.c:1110\n\n CPU: 6 UID: 0 PID: 41377 Comm: kworker/u64:24 Not tainted  6.17.0-rc1+ #1 PREEMPT(lazy)\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS edk2-20250523-14.fc42 05/23/2025\n Workqueue: events_unbound cfg80211_wiphy_work [cfg80211]\n\n Use-after-free write at 0x0000000020309d9d (in kfence-#251):\n rtw89_core_tx_kick_off_and_wait drivers/net/wireless/realtek/rtw89/core.c:1110\n rtw89_core_scan_complete drivers/net/wireless/realtek/rtw89/core.c:5338\n rtw89_hw_scan_complete_cb drivers/net/wireless/realtek/rtw89/fw.c:7979\n rtw89_chanctx_proceed_cb drivers/net/wireless/realtek/rtw89/chan.c:3165\n rtw89_chanctx_proceed drivers/net/wireless/realtek/rtw89/chan.h:141\n rtw89_hw_scan_complete drivers/net/wireless/realtek/rtw89/fw.c:8012\n rtw89_mac_c2h_scanofld_rsp drivers/net/wireless/realtek/rtw89/mac.c:5059\n rtw89_fw_c2h_work drivers/net/wireless/realtek/rtw89/fw.c:6758\n process_one_work kernel/workqueue.c:3241\n worker_thread kernel/workqueue.c:3400\n kthread kernel/kthread.c:463\n ret_from_fork arch/x86/kernel/process.c:154\n ret_from_fork_asm arch/x86/entry/entry_64.S:258\n\n kfence-#251: 0x0000000056e2393d-0x000000009943cb62, size=232, cache=skbuff_head_cache\n\n allocated by task 41377 on cpu 6 at 77869.159548s (0.009551s ago):\n __alloc_skb net/core/skbuff.c:659\n __netdev_alloc_skb net/core/skbuff.c:734\n ieee80211_nullfunc_get net/mac80211/tx.c:5844\n rtw89_core_send_nullfunc drivers/net/wireless/realtek/rtw89/core.c:3431\n rtw89_core_scan_complete drivers/net/wireless/realtek/rtw89/core.c:5338\n rtw89_hw_scan_complete_cb drivers/net/wireless/realtek/rtw89/fw.c:7979\n rtw89_chanctx_proceed_cb drivers/net/wireless/realtek/rtw89/chan.c:3165\n rtw89_chanctx_proceed drivers/net/wireless/realtek/rtw89/chan.c:3194\n rtw89_hw_scan_complete drivers/net/wireless/realtek/rtw89/fw.c:8012\n rtw89_mac_c2h_scanofld_rsp drivers/net/wireless/realtek/rtw89/mac.c:5059\n rtw89_fw_c2h_work drivers/net/wireless/realtek/rtw89/fw.c:6758\n process_one_work kernel/workqueue.c:3241\n worker_thread kernel/workqueue.c:3400\n kthread kernel/kthread.c:463\n ret_from_fork arch/x86/kernel/process.c:154\n ret_from_fork_asm arch/x86/entry/entry_64.S:258\n\n freed by task 1045 on cpu 9 at 77869.168393s (0.001557s ago):\n ieee80211_tx_status_skb net/mac80211/status.c:1117\n rtw89_pci_release_txwd_skb drivers/net/wireless/realtek/rtw89/pci.c:564\n rtw89_pci_release_tx_skbs.isra.0 drivers/net/wireless/realtek/rtw89/pci.c:651\n rtw89_pci_release_tx drivers/net/wireless/realtek/rtw89/pci.c:676\n rtw89_pci_napi_poll drivers/net/wireless/realtek/rtw89/pci.c:4238\n __napi_poll net/core/dev.c:7495\n net_rx_action net/core/dev.c:7557 net/core/dev.c:7684\n handle_softirqs kernel/softirq.c:580\n do_softirq.part.0 kernel/softirq.c:480\n __local_bh_enable_ip kernel/softirq.c:407\n rtw89_pci_interrupt_threadfn drivers/net/wireless/realtek/rtw89/pci.c:927\n irq_thread_fn kernel/irq/manage.c:1133\n irq_thread kernel/irq/manage.c:1257\n kthread kernel/kthread.c:463\n ret_from_fork arch/x86/kernel/process.c:154\n ret_from_fork_asm arch/x86/entry/entry_64.S:258\n\nIt is a consequence of a race between the waiting and the signaling side\nof the completion:\n\n            Waiting thread                            Completing thread\n\nrtw89_core_tx_kick_off_and_wait()\n  rcu_assign_pointer(skb_data-\u003ewait, wait)\n  /* start waiting */\n  wait_for_completion_timeout()\n                                                rtw89_pci_tx_status()\n                                                  rtw89_core_tx_wait_complete()\n                                                    rcu_read_lock()\n                                                    /* signals completion and\n   \n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40000",
          "url": "https://www.suse.com/security/cve/CVE-2025-40000"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252062 for CVE-2025-40000",
          "url": "https://bugzilla.suse.com/1252062"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40000"
    },
    {
      "cve": "CVE-2025-40001",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40001"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove)            | CPU 1 (delayed work callback)\nmvs_pci_remove()          |\n  mvs_free()              | mvs_work_queue()\n    cancel_delayed_work() |\n      kfree(mvi)          |\n                          |   mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40001",
          "url": "https://www.suse.com/security/cve/CVE-2025-40001"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252303 for CVE-2025-40001",
          "url": "https://bugzilla.suse.com/1252303"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40001"
    },
    {
      "cve": "CVE-2025-40002",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40002"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nthunderbolt: Fix use-after-free in tb_dp_dprx_work\n\nThe original code relies on cancel_delayed_work() in tb_dp_dprx_stop(),\nwhich does not ensure that the delayed work item tunnel-\u003edprx_work has\nfully completed if it was already running. This leads to use-after-free\nscenarios where tb_tunnel is deallocated by tb_tunnel_put(), while\ntunnel-\u003edprx_work remains active and attempts to dereference tb_tunnel\nin tb_dp_dprx_work().\n\nA typical race condition is illustrated below:\n\nCPU 0                            | CPU 1\ntb_dp_tunnel_active()            |\n  tb_deactivate_and_free_tunnel()| tb_dp_dprx_start()\n    tb_tunnel_deactivate()       |   queue_delayed_work()\n      tb_dp_activate()           |\n        tb_dp_dprx_stop()        | tb_dp_dprx_work() //delayed worker\n          cancel_delayed_work()  |\n    tb_tunnel_put(tunnel);       |\n                                 |   tunnel = container_of(...); //UAF\n                                 |   tunnel-\u003e //UAF\n\nReplacing cancel_delayed_work() with cancel_delayed_work_sync() is\nnot feasible as it would introduce a deadlock: both tb_dp_dprx_work()\nand the cleanup path acquire tb-\u003elock, and cancel_delayed_work_sync()\nwould wait indefinitely for the work item that cannot proceed.\n\nInstead, implement proper reference counting:\n- If cancel_delayed_work() returns true (work is pending), we release\n  the reference in the stop function.\n- If it returns false (work is executing or already completed), the\n  reference is released in delayed work function itself.\n\nThis ensures the tb_tunnel remains valid during work item execution\nwhile preventing memory leaks.\n\nThis bug was found by static analysis.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40002",
          "url": "https://www.suse.com/security/cve/CVE-2025-40002"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252302 for CVE-2025-40002",
          "url": "https://bugzilla.suse.com/1252302"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40002"
    },
    {
      "cve": "CVE-2025-40003",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40003"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mscc: ocelot: Fix use-after-free caused by cyclic delayed work\n\nThe origin code calls cancel_delayed_work() in ocelot_stats_deinit()\nto cancel the cyclic delayed work item ocelot-\u003estats_work. However,\ncancel_delayed_work() may fail to cancel the work item if it is already\nexecuting. While destroy_workqueue() does wait for all pending work items\nin the work queue to complete before destroying the work queue, it cannot\nprevent the delayed work item from being rescheduled within the\nocelot_check_stats_work() function. This limitation exists because the\ndelayed work item is only enqueued into the work queue after its timer\nexpires. Before the timer expiration, destroy_workqueue() has no visibility\nof this pending work item. Once the work queue appears empty,\ndestroy_workqueue() proceeds with destruction. When the timer eventually\nexpires, the delayed work item gets queued again, leading to the following\nwarning:\n\nworkqueue: cannot queue ocelot_check_stats_work on wq ocelot-switch-stats\nWARNING: CPU: 2 PID: 0 at kernel/workqueue.c:2255 __queue_work+0x875/0xaf0\n...\nRIP: 0010:__queue_work+0x875/0xaf0\n...\nRSP: 0018:ffff88806d108b10 EFLAGS: 00010086\nRAX: 0000000000000000 RBX: 0000000000000101 RCX: 0000000000000027\nRDX: 0000000000000027 RSI: 0000000000000004 RDI: ffff88806d123e88\nRBP: ffffffff813c3170 R08: 0000000000000000 R09: ffffed100da247d2\nR10: ffffed100da247d1 R11: ffff88806d123e8b R12: ffff88800c00f000\nR13: ffff88800d7285c0 R14: ffff88806d0a5580 R15: ffff88800d7285a0\nFS:  0000000000000000(0000) GS:ffff8880e5725000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fe18e45ea10 CR3: 0000000005e6c000 CR4: 00000000000006f0\nCall Trace:\n \u003cIRQ\u003e\n ? kasan_report+0xc6/0xf0\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n call_timer_fn+0x25/0x1c0\n __run_timer_base.part.0+0x3be/0x8c0\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n ? rcu_sched_clock_irq+0xb06/0x27d0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? try_to_wake_up+0xb15/0x1960\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n tmigr_handle_remote_up+0x603/0x7e0\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n ? sched_balance_trigger+0x1c0/0x9f0\n ? sched_tick+0x221/0x5a0\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n ? tick_nohz_handler+0x339/0x440\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n __walk_groups.isra.0+0x42/0x150\n tmigr_handle_remote+0x1f4/0x2e0\n ? __pfx_tmigr_handle_remote+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n ? hrtimer_interrupt+0x322/0x780\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\n\nThe following diagram reveals the cause of the above warning:\n\nCPU 0 (remove)             | CPU 1 (delayed work callback)\nmscc_ocelot_remove()       |\n  ocelot_deinit()          | ocelot_check_stats_work()\n    ocelot_stats_deinit()  |\n      cancel_delayed_work()|   ...\n                           |   queue_delayed_work()\n      destroy_workqueue()  | (wait a time)\n                           | __queue_work() //UAF\n\nThe above scenario actually constitutes a UAF vulnerability.\n\nThe ocelot_stats_deinit() is only invoked when initialization\nfailure or resource destruction, so we must ensure that any\ndelayed work items cannot be rescheduled.\n\nReplace cancel_delayed_work() with disable_delayed_work_sync()\nto guarantee proper cancellation of the delayed work item and\nensure completion of any currently executing work before the\nworkqueue is deallocated.\n\nA deadlock concern was considered: ocelot_stats_deinit() is called\nin a process context and is not holding any locks that the delayed\nwork item might also need. Therefore, the use of the _sync() variant\nis safe here.\n\nThis bug was identified through static analysis. To reproduce the\nissue and validate the fix, I simulated ocelot-swit\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40003",
          "url": "https://www.suse.com/security/cve/CVE-2025-40003"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252301 for CVE-2025-40003",
          "url": "https://bugzilla.suse.com/1252301"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40003"
    },
    {
      "cve": "CVE-2025-40004",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40004"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: Fix buffer overflow in USB transport layer\n\nA buffer overflow vulnerability exists in the USB 9pfs transport layer\nwhere inconsistent size validation between packet header parsing and\nactual data copying allows a malicious USB host to overflow heap buffers.\n\nThe issue occurs because:\n- usb9pfs_rx_header() validates only the declared size in packet header\n- usb9pfs_rx_complete() uses req-\u003eactual (actual received bytes) for\nmemcpy\n\nThis allows an attacker to craft packets with small declared size\n(bypassing validation) but large actual payload (triggering overflow\nin memcpy).\n\nAdd validation in usb9pfs_rx_complete() to ensure req-\u003eactual does not\nexceed the buffer capacity before copying data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40004",
          "url": "https://www.suse.com/security/cve/CVE-2025-40004"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252310 for CVE-2025-40004",
          "url": "https://bugzilla.suse.com/1252310"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40004"
    },
    {
      "cve": "CVE-2025-40013",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40013"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: qcom: audioreach: fix potential null pointer dereference\n\nIt is possible that the topology parsing function\naudioreach_widget_load_module_common() could return NULL or an error\npointer. Add missing NULL check so that we do not dereference it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40013",
          "url": "https://www.suse.com/security/cve/CVE-2025-40013"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252348 for CVE-2025-40013",
          "url": "https://bugzilla.suse.com/1252348"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40013"
    },
    {
      "cve": "CVE-2025-40015",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40015"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: stm32-csi: Fix dereference before NULL check\n\nIn \u0027stm32_csi_start\u0027, \u0027csidev-\u003es_subdev\u0027 is dereferenced directly while\nassigning a value to the \u0027src_pad\u0027. However the same value is being\nchecked against NULL at a later point of time indicating that there\nare chances that the value can be NULL.\n\nMove the dereference after the NULL check.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40015",
          "url": "https://www.suse.com/security/cve/CVE-2025-40015"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252345 for CVE-2025-40015",
          "url": "https://bugzilla.suse.com/1252345"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40015"
    },
    {
      "cve": "CVE-2025-40016",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40016"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID\n\nPer UVC 1.1+ specification 3.7.2, units and terminals must have a non-zero\nunique ID.\n\n```\nEach Unit and Terminal within the video function is assigned a unique\nidentification number, the Unit ID (UID) or Terminal ID (TID), contained in\nthe bUnitID or bTerminalID field of the descriptor. The value 0x00 is\nreserved for undefined ID,\n```\n\nIf we add a new entity with id 0 or a duplicated ID, it will be marked\nas UVC_INVALID_ENTITY_ID.\n\nIn a previous attempt commit 3dd075fe8ebb (\"media: uvcvideo: Require\nentities to have a non-zero unique ID\"), we ignored all the invalid units,\nthis broke a lot of non-compatible cameras. Hopefully we are more lucky\nthis time.\n\nThis also prevents some syzkaller reproducers from triggering warnings due\nto a chain of entities referring to themselves. In one particular case, an\nOutput Unit is connected to an Input Unit, both with the same ID of 1. But\nwhen looking up for the source ID of the Output Unit, that same entity is\nfound instead of the input entity, which leads to such warnings.\n\nIn another case, a backward chain was considered finished as the source ID\nwas 0. Later on, that entity was found, but its pads were not valid.\n\nHere is a sample stack trace for one of those cases.\n\n[   20.650953] usb 1-1: new high-speed USB device number 2 using dummy_hcd\n[   20.830206] usb 1-1: Using ep0 maxpacket: 8\n[   20.833501] usb 1-1: config 0 descriptor??\n[   21.038518] usb 1-1: string descriptor 0 read error: -71\n[   21.038893] usb 1-1: Found UVC 0.00 device \u003cunnamed\u003e (2833:0201)\n[   21.039299] uvcvideo 1-1:0.0: Entity type for entity Output 1 was not initialized!\n[   21.041583] uvcvideo 1-1:0.0: Entity type for entity Input 1 was not initialized!\n[   21.042218] ------------[ cut here ]------------\n[   21.042536] WARNING: CPU: 0 PID: 9 at drivers/media/mc/mc-entity.c:1147 media_create_pad_link+0x2c4/0x2e0\n[   21.043195] Modules linked in:\n[   21.043535] CPU: 0 UID: 0 PID: 9 Comm: kworker/0:1 Not tainted 6.11.0-rc7-00030-g3480e43aeccf #444\n[   21.044101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014\n[   21.044639] Workqueue: usb_hub_wq hub_event\n[   21.045100] RIP: 0010:media_create_pad_link+0x2c4/0x2e0\n[   21.045508] Code: fe e8 20 01 00 00 b8 f4 ff ff ff 48 83 c4 30 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc 0f 0b eb e9 0f 0b eb 0a 0f 0b eb 06 \u003c0f\u003e 0b eb 02 0f 0b b8 ea ff ff ff eb d4 66 2e 0f 1f 84 00 00 00 00\n[   21.046801] RSP: 0018:ffffc9000004b318 EFLAGS: 00010246\n[   21.047227] RAX: ffff888004e5d458 RBX: 0000000000000000 RCX: ffffffff818fccf1\n[   21.047719] RDX: 000000000000007b RSI: 0000000000000000 RDI: ffff888004313290\n[   21.048241] RBP: ffff888004313290 R08: 0001ffffffffffff R09: 0000000000000000\n[   21.048701] R10: 0000000000000013 R11: 0001888004313290 R12: 0000000000000003\n[   21.049138] R13: ffff888004313080 R14: ffff888004313080 R15: 0000000000000000\n[   21.049648] FS:  0000000000000000(0000) GS:ffff88803ec00000(0000) knlGS:0000000000000000\n[   21.050271] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[   21.050688] CR2: 0000592cc27635b0 CR3: 000000000431c000 CR4: 0000000000750ef0\n[   21.051136] PKRU: 55555554\n[   21.051331] Call Trace:\n[   21.051480]  \u003cTASK\u003e\n[   21.051611]  ? __warn+0xc4/0x210\n[   21.051861]  ? media_create_pad_link+0x2c4/0x2e0\n[   21.052252]  ? report_bug+0x11b/0x1a0\n[   21.052540]  ? trace_hardirqs_on+0x31/0x40\n[   21.052901]  ? handle_bug+0x3d/0x70\n[   21.053197]  ? exc_invalid_op+0x1a/0x50\n[   21.053511]  ? asm_exc_invalid_op+0x1a/0x20\n[   21.053924]  ? media_create_pad_link+0x91/0x2e0\n[   21.054364]  ? media_create_pad_link+0x2c4/0x2e0\n[   21.054834]  ? media_create_pad_link+0x91/0x2e0\n[   21.055131]  ? _raw_spin_unlock+0x1e/0x40\n[   21.055441]  ? __v4l2_device_register_subdev+0x202/0x210\n[   21.055837]  uvc_mc_register_entities+0x358/0x400\n[   21.056144]  uvc_register_chains+0x1\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40016",
          "url": "https://www.suse.com/security/cve/CVE-2025-40016"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252346 for CVE-2025-40016",
          "url": "https://bugzilla.suse.com/1252346"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2025-40016"
    },
    {
      "cve": "CVE-2025-40017",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40017"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: iris: Fix memory leak by freeing untracked persist buffer\n\nOne internal buffer which is allocated only once per session was not\nbeing freed during session close because it was not being tracked as\npart of internal buffer list which resulted in a memory leak.\n\nAdd the necessary logic to explicitly free the untracked internal buffer\nduring session close to ensure all allocated memory is released\nproperly.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40017",
          "url": "https://www.suse.com/security/cve/CVE-2025-40017"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252335 for CVE-2025-40017",
          "url": "https://bugzilla.suse.com/1252335"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2025-40017"
    },
    {
      "cve": "CVE-2025-40018",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40018"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvs: Defer ip_vs_ftp unregister during netns cleanup\n\nOn the netns cleanup path, __ip_vs_ftp_exit() may unregister ip_vs_ftp\nbefore connections with valid cp-\u003eapp pointers are flushed, leading to a\nuse-after-free.\n\nFix this by introducing a global `exiting_module` flag, set to true in\nip_vs_ftp_exit() before unregistering the pernet subsystem. In\n__ip_vs_ftp_exit(), skip ip_vs_ftp unregister if called during netns\ncleanup (when exiting_module is false) and defer it to\n__ip_vs_cleanup_batch(), which unregisters all apps after all connections\nare flushed. If called during module exit, unregister ip_vs_ftp\nimmediately.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40018",
          "url": "https://www.suse.com/security/cve/CVE-2025-40018"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1247374 for CVE-2025-40018",
          "url": "https://bugzilla.suse.com/1247374"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252688 for CVE-2025-40018",
          "url": "https://bugzilla.suse.com/1252688"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252689 for CVE-2025-40018",
          "url": "https://bugzilla.suse.com/1252689"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1253291 for CVE-2025-40018",
          "url": "https://bugzilla.suse.com/1253291"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-40018"
    },
    {
      "cve": "CVE-2025-40019",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40019"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: essiv - Check ssize for decryption and in-place encryption\n\nMove the ssize check to the start in essiv_aead_crypt so that\nit\u0027s also checked for decryption and in-place encryption.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40019",
          "url": "https://www.suse.com/security/cve/CVE-2025-40019"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252678 for CVE-2025-40019",
          "url": "https://bugzilla.suse.com/1252678"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252719 for CVE-2025-40019",
          "url": "https://bugzilla.suse.com/1252719"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-40019"
    },
    {
      "cve": "CVE-2025-40025",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40025"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to do sanity check on node footer for non inode dnode\n\nAs syzbot reported below:\n\n------------[ cut here ]------------\nkernel BUG at fs/f2fs/file.c:1243!\nOops: invalid opcode: 0000 [#1] SMP KASAN NOPTI\nCPU: 0 UID: 0 PID: 5354 Comm: syz.0.0 Not tainted 6.17.0-rc1-syzkaller-00211-g90d970cade8e #0 PREEMPT(full)\nRIP: 0010:f2fs_truncate_hole+0x69e/0x6c0 fs/f2fs/file.c:1243\nCall Trace:\n \u003cTASK\u003e\n f2fs_punch_hole+0x2db/0x330 fs/f2fs/file.c:1306\n f2fs_fallocate+0x546/0x990 fs/f2fs/file.c:2018\n vfs_fallocate+0x666/0x7e0 fs/open.c:342\n ksys_fallocate fs/open.c:366 [inline]\n __do_sys_fallocate fs/open.c:371 [inline]\n __se_sys_fallocate fs/open.c:369 [inline]\n __x64_sys_fallocate+0xc0/0x110 fs/open.c:369\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f1e65f8ebe9\n\nw/ a fuzzed image, f2fs may encounter panic due to it detects inconsistent\ntruncation range in direct node in f2fs_truncate_hole().\n\nThe root cause is: a non-inode dnode may has the same footer.ino and\nfooter.nid, so the dnode will be parsed as an inode, then ADDRS_PER_PAGE()\nmay return wrong blkaddr count which may be 923 typically, by chance,\ndn.ofs_in_node is equal to 923, then count can be calculated to 0 in below\nstatement, later it will trigger panic w/ f2fs_bug_on(, count == 0 || ...).\n\n\tcount = min(end_offset - dn.ofs_in_node, pg_end - pg_start);\n\nThis patch introduces a new node_type NODE_TYPE_NON_INODE, then allowing\npassing the new_type to sanity_check_node_footer in f2fs_get_node_folio()\nto detect corruption that a non-inode dnode has the same footer.ino and\nfooter.nid.\n\nScripts to reproduce:\nmkfs.f2fs -f /dev/vdb\nmount /dev/vdb /mnt/f2fs\ntouch /mnt/f2fs/foo\ntouch /mnt/f2fs/bar\ndd if=/dev/zero of=/mnt/f2fs/foo bs=1M count=8\numount /mnt/f2fs\ninject.f2fs --node --mb i_nid --nid 4 --idx 0 --val 5 /dev/vdb\nmount /dev/vdb /mnt/f2fs\nxfs_io /mnt/f2fs/foo -c \"fpunch 6984k 4k\"",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40025",
          "url": "https://www.suse.com/security/cve/CVE-2025-40025"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252766 for CVE-2025-40025",
          "url": "https://bugzilla.suse.com/1252766"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40025"
    },
    {
      "cve": "CVE-2025-40026",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40026"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: x86: Don\u0027t (re)check L1 intercepts when completing userspace I/O\n\nWhen completing emulation of instruction that generated a userspace exit\nfor I/O, don\u0027t recheck L1 intercepts as KVM has already finished that\nphase of instruction execution, i.e. has already committed to allowing L2\nto perform I/O.  If L1 (or host userspace) modifies the I/O permission\nbitmaps during the exit to userspace,  KVM will treat the access as being\nintercepted despite already having emulated the I/O access.\n\nPivot on EMULTYPE_NO_DECODE to detect that KVM is completing emulation.\nOf the three users of EMULTYPE_NO_DECODE, only complete_emulated_io() (the\nintended \"recipient\") can reach the code in question.  gp_interception()\u0027s\nuse is mutually exclusive with is_guest_mode(), and\ncomplete_emulated_insn_gp() unconditionally pairs EMULTYPE_NO_DECODE with\nEMULTYPE_SKIP.\n\nThe bad behavior was detected by a syzkaller program that toggles port I/O\ninterception during the userspace I/O exit, ultimately resulting in a WARN\non vcpu-\u003earch.pio.count being non-zero due to KVM no completing emulation\nof the I/O instruction.\n\n  WARNING: CPU: 23 PID: 1083 at arch/x86/kvm/x86.c:8039 emulator_pio_in_out+0x154/0x170 [kvm]\n  Modules linked in: kvm_intel kvm irqbypass\n  CPU: 23 UID: 1000 PID: 1083 Comm: repro Not tainted 6.16.0-rc5-c1610d2d66b1-next-vm #74 NONE\n  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015\n  RIP: 0010:emulator_pio_in_out+0x154/0x170 [kvm]\n  PKRU: 55555554\n  Call Trace:\n   \u003cTASK\u003e\n   kvm_fast_pio+0xd6/0x1d0 [kvm]\n   vmx_handle_exit+0x149/0x610 [kvm_intel]\n   kvm_arch_vcpu_ioctl_run+0xda8/0x1ac0 [kvm]\n   kvm_vcpu_ioctl+0x244/0x8c0 [kvm]\n   __x64_sys_ioctl+0x8a/0xd0\n   do_syscall_64+0x5d/0xc60\n   entry_SYSCALL_64_after_hwframe+0x4b/0x53\n   \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40026",
          "url": "https://www.suse.com/security/cve/CVE-2025-40026"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252764 for CVE-2025-40026",
          "url": "https://bugzilla.suse.com/1252764"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.6,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2025-40026"
    },
    {
      "cve": "CVE-2025-40027",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40027"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n      Thread 1                              Thread 2\n    ...\n    p9_client_create()\n    ...\n    p9_fd_create()\n    ...\n    p9_conn_create()\n    ...\n    // start Thread 2\n    INIT_WORK(\u0026m-\u003erq, p9_read_work);\n                                        p9_read_work()\n    ...\n    p9_client_rpc()\n    ...\n                                        ...\n                                        p9_conn_cancel()\n                                        ...\n                                        spin_lock(\u0026m-\u003ereq_lock);\n    ...\n    p9_fd_cancelled()\n    ...\n                                        ...\n                                        spin_unlock(\u0026m-\u003ereq_lock);\n                                        // status rewrite\n                                        p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n                                        // first remove\n                                        list_del(\u0026req-\u003ereq_list);\n                                        ...\n\n    spin_lock(\u0026m-\u003ereq_lock)\n    ...\n    // second remove\n    list_del(\u0026req-\u003ereq_list);\n    spin_unlock(\u0026m-\u003ereq_lock)\n  ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40027",
          "url": "https://www.suse.com/security/cve/CVE-2025-40027"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252763 for CVE-2025-40027",
          "url": "https://bugzilla.suse.com/1252763"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40027"
    },
    {
      "cve": "CVE-2025-40028",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40028"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbinder: fix double-free in dbitmap\n\nA process might fail to allocate a new bitmap when trying to expand its\nproc-\u003edmap. In that case, dbitmap_grow() fails and frees the old bitmap\nvia dbitmap_free(). However, the driver calls dbitmap_free() again when\nthe same process terminates, leading to a double-free error:\n\n  ==================================================================\n  BUG: KASAN: double-free in binder_proc_dec_tmpref+0x2e0/0x55c\n  Free of addr ffff00000b7c1420 by task kworker/9:1/209\n\n  CPU: 9 UID: 0 PID: 209 Comm: kworker/9:1 Not tainted 6.17.0-rc6-dirty #5 PREEMPT\n  Hardware name: linux,dummy-virt (DT)\n  Workqueue: events binder_deferred_func\n  Call trace:\n   kfree+0x164/0x31c\n   binder_proc_dec_tmpref+0x2e0/0x55c\n   binder_deferred_func+0xc24/0x1120\n   process_one_work+0x520/0xba4\n  [...]\n\n  Allocated by task 448:\n   __kmalloc_noprof+0x178/0x3c0\n   bitmap_zalloc+0x24/0x30\n   binder_open+0x14c/0xc10\n  [...]\n\n  Freed by task 449:\n   kfree+0x184/0x31c\n   binder_inc_ref_for_node+0xb44/0xe44\n   binder_transaction+0x29b4/0x7fbc\n   binder_thread_write+0x1708/0x442c\n   binder_ioctl+0x1b50/0x2900\n  [...]\n  ==================================================================\n\nFix this issue by marking proc-\u003emap NULL in dbitmap_free().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40028",
          "url": "https://www.suse.com/security/cve/CVE-2025-40028"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252762 for CVE-2025-40028",
          "url": "https://bugzilla.suse.com/1252762"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40028"
    },
    {
      "cve": "CVE-2025-40029",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40029"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbus: fsl-mc: Check return value of platform_get_resource()\n\nplatform_get_resource() returns NULL in case of failure, so check its\nreturn value and propagate the error in order to prevent NULL pointer\ndereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40029",
          "url": "https://www.suse.com/security/cve/CVE-2025-40029"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252772 for CVE-2025-40029",
          "url": "https://bugzilla.suse.com/1252772"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40029"
    },
    {
      "cve": "CVE-2025-40030",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40030"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: check the return value of pinmux_ops::get_function_name()\n\nWhile the API contract in docs doesn\u0027t specify it explicitly, the\ngeneric implementation of the get_function_name() callback from struct\npinmux_ops - pinmux_generic_get_function_name() - can fail and return\nNULL. This is already checked in pinmux_check_ops() so add a similar\ncheck in pinmux_func_name_to_selector() instead of passing the returned\npointer right down to strcmp() where the NULL can get dereferenced. This\nis normal operation when adding new pinfunctions.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40030",
          "url": "https://www.suse.com/security/cve/CVE-2025-40030"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252773 for CVE-2025-40030",
          "url": "https://bugzilla.suse.com/1252773"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40030"
    },
    {
      "cve": "CVE-2025-40031",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40031"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntee: fix register_shm_helper()\n\nIn register_shm_helper(), fix incorrect error handling for a call to\niov_iter_extract_pages(). A case is missing for when\niov_iter_extract_pages() only got some pages and return a number larger\nthan 0, but not the requested amount.\n\nThis fixes a possible NULL pointer dereference following a bad input from\nioctl(TEE_IOC_SHM_REGISTER) where parts of the buffer isn\u0027t mapped.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40031",
          "url": "https://www.suse.com/security/cve/CVE-2025-40031"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252779 for CVE-2025-40031",
          "url": "https://bugzilla.suse.com/1252779"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40031"
    },
    {
      "cve": "CVE-2025-40032",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40032"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: endpoint: pci-epf-test: Add NULL check for DMA channels before release\n\nThe fields dma_chan_tx and dma_chan_rx of the struct pci_epf_test can be\nNULL even after EPF initialization. Then it is prudent to check that\nthey have non-NULL values before releasing the channels. Add the checks\nin pci_epf_test_clean_dma_chan().\n\nWithout the checks, NULL pointer dereferences happen and they can lead\nto a kernel panic in some cases:\n\n  Unable to handle kernel NULL pointer dereference at virtual address 0000000000000050\n  Call trace:\n   dma_release_channel+0x2c/0x120 (P)\n   pci_epf_test_epc_deinit+0x94/0xc0 [pci_epf_test]\n   pci_epc_deinit_notify+0x74/0xc0\n   tegra_pcie_ep_pex_rst_irq+0x250/0x5d8\n   irq_thread_fn+0x34/0xb8\n   irq_thread+0x18c/0x2e8\n   kthread+0x14c/0x210\n   ret_from_fork+0x10/0x20\n\n[mani: trimmed the stack trace]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40032",
          "url": "https://www.suse.com/security/cve/CVE-2025-40032"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252841 for CVE-2025-40032",
          "url": "https://bugzilla.suse.com/1252841"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40032"
    },
    {
      "cve": "CVE-2025-40033",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40033"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nremoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable()\n\npru_rproc_set_ctable() accessed rproc-\u003epriv before the IS_ERR_OR_NULL\ncheck, which could lead to a null pointer dereference. Move the pru\nassignment, ensuring we never dereference a NULL rproc pointer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40033",
          "url": "https://www.suse.com/security/cve/CVE-2025-40033"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252824 for CVE-2025-40033",
          "url": "https://bugzilla.suse.com/1252824"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40033"
    },
    {
      "cve": "CVE-2025-40034",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40034"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI/AER: Avoid NULL pointer dereference in aer_ratelimit()\n\nWhen platform firmware supplies error information to the OS, e.g., via the\nACPI APEI GHES mechanism, it may identify an error source device that\ndoesn\u0027t advertise an AER Capability and therefore dev-\u003eaer_info, which\ncontains AER stats and ratelimiting data, is NULL.\n\npci_dev_aer_stats_incr() already checks dev-\u003eaer_info for NULL, but\naer_ratelimit() did not, leading to NULL pointer dereferences like this one\nfrom the URL below:\n\n  {1}[Hardware Error]: Hardware error from APEI Generic Hardware Error Source: 0\n  {1}[Hardware Error]: event severity: corrected\n  {1}[Hardware Error]:   device_id: 0000:00:00.0\n  {1}[Hardware Error]:   vendor_id: 0x8086, device_id: 0x2020\n  {1}[Hardware Error]:   aer_cor_status: 0x00001000, aer_cor_mask: 0x00002000\n  BUG: kernel NULL pointer dereference, address: 0000000000000264\n  RIP: 0010:___ratelimit+0xc/0x1b0\n  pci_print_aer+0x141/0x360\n  aer_recover_work_func+0xb5/0x130\n\n[8086:2020] is an Intel \"Sky Lake-E DMI3 Registers\" device that claims to\nbe a Root Port but does not advertise an AER Capability.\n\nAdd a NULL check in aer_ratelimit() to avoid the NULL pointer dereference.\nNote that this also prevents ratelimiting these events from GHES.\n\n[bhelgaas: add crash details to commit log]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40034",
          "url": "https://www.suse.com/security/cve/CVE-2025-40034"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252868 for CVE-2025-40034",
          "url": "https://bugzilla.suse.com/1252868"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40034"
    },
    {
      "cve": "CVE-2025-40035",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40035"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak\n\nStruct ff_effect_compat is embedded twice inside\nuinput_ff_upload_compat, contains internal padding. In particular, there\nis a hole after struct ff_replay to satisfy alignment requirements for\nthe following union member. Without clearing the structure,\ncopy_to_user() may leak stack data to userspace.\n\nInitialize ff_up_compat to zero before filling valid fields.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40035",
          "url": "https://www.suse.com/security/cve/CVE-2025-40035"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252866 for CVE-2025-40035",
          "url": "https://bugzilla.suse.com/1252866"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40035"
    },
    {
      "cve": "CVE-2025-40036",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40036"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: fastrpc: fix possible map leak in fastrpc_put_args\n\ncopy_to_user() failure would cause an early return without cleaning up\nthe fdlist, which has been updated by the DSP. This could lead to map\nleak. Fix this by redirecting to a cleanup path on failure, ensuring\nthat all mapped buffers are properly released before returning.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40036",
          "url": "https://www.suse.com/security/cve/CVE-2025-40036"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252865 for CVE-2025-40036",
          "url": "https://bugzilla.suse.com/1252865"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40036"
    },
    {
      "cve": "CVE-2025-40037",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40037"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: simplefb: Fix use after free in simplefb_detach_genpds()\n\nThe pm_domain cleanup can not be devres managed as it uses struct\nsimplefb_par which is allocated within struct fb_info by\nframebuffer_alloc(). This allocation is explicitly freed by\nunregister_framebuffer() in simplefb_remove().\nDevres managed cleanup runs after the device remove call and thus can no\nlonger access struct simplefb_par.\nCall simplefb_detach_genpds() explicitly from simplefb_destroy() like\nthe cleanup functions for clocks and regulators.\n\nFixes an use after free on M2 Mac mini during\naperture_remove_conflicting_devices() using the downstream asahi kernel\nwith Debian\u0027s kernel config. For unknown reasons this started to\nconsistently dereference an invalid pointer in v6.16.3 based kernels.\n\n[    6.736134] BUG: KASAN: slab-use-after-free in simplefb_detach_genpds+0x58/0x220\n[    6.743545] Read of size 4 at addr ffff8000304743f0 by task (udev-worker)/227\n[    6.750697]\n[    6.752182] CPU: 6 UID: 0 PID: 227 Comm: (udev-worker) Tainted: G S                  6.16.3-asahi+ #16 PREEMPTLAZY\n[    6.752186] Tainted: [S]=CPU_OUT_OF_SPEC\n[    6.752187] Hardware name: Apple Mac mini (M2, 2023) (DT)\n[    6.752189] Call trace:\n[    6.752190]  show_stack+0x34/0x98 (C)\n[    6.752194]  dump_stack_lvl+0x60/0x80\n[    6.752197]  print_report+0x17c/0x4d8\n[    6.752201]  kasan_report+0xb4/0x100\n[    6.752206]  __asan_report_load4_noabort+0x20/0x30\n[    6.752209]  simplefb_detach_genpds+0x58/0x220\n[    6.752213]  devm_action_release+0x50/0x98\n[    6.752216]  release_nodes+0xd0/0x2c8\n[    6.752219]  devres_release_all+0xfc/0x178\n[    6.752221]  device_unbind_cleanup+0x28/0x168\n[    6.752224]  device_release_driver_internal+0x34c/0x470\n[    6.752228]  device_release_driver+0x20/0x38\n[    6.752231]  bus_remove_device+0x1b0/0x380\n[    6.752234]  device_del+0x314/0x820\n[    6.752238]  platform_device_del+0x3c/0x1e8\n[    6.752242]  platform_device_unregister+0x20/0x50\n[    6.752246]  aperture_detach_platform_device+0x1c/0x30\n[    6.752250]  aperture_detach_devices+0x16c/0x290\n[    6.752253]  aperture_remove_conflicting_devices+0x34/0x50\n...\n[    6.752343]\n[    6.967409] Allocated by task 62:\n[    6.970724]  kasan_save_stack+0x3c/0x70\n[    6.974560]  kasan_save_track+0x20/0x40\n[    6.978397]  kasan_save_alloc_info+0x40/0x58\n[    6.982670]  __kasan_kmalloc+0xd4/0xd8\n[    6.986420]  __kmalloc_noprof+0x194/0x540\n[    6.990432]  framebuffer_alloc+0xc8/0x130\n[    6.994444]  simplefb_probe+0x258/0x2378\n...\n[    7.054356]\n[    7.055838] Freed by task 227:\n[    7.058891]  kasan_save_stack+0x3c/0x70\n[    7.062727]  kasan_save_track+0x20/0x40\n[    7.066565]  kasan_save_free_info+0x4c/0x80\n[    7.070751]  __kasan_slab_free+0x6c/0xa0\n[    7.074675]  kfree+0x10c/0x380\n[    7.077727]  framebuffer_release+0x5c/0x90\n[    7.081826]  simplefb_destroy+0x1b4/0x2c0\n[    7.085837]  put_fb_info+0x98/0x100\n[    7.089326]  unregister_framebuffer+0x178/0x320\n[    7.093861]  simplefb_remove+0x3c/0x60\n[    7.097611]  platform_remove+0x60/0x98\n[    7.101361]  device_remove+0xb8/0x160\n[    7.105024]  device_release_driver_internal+0x2fc/0x470\n[    7.110256]  device_release_driver+0x20/0x38\n[    7.114529]  bus_remove_device+0x1b0/0x380\n[    7.118628]  device_del+0x314/0x820\n[    7.122116]  platform_device_del+0x3c/0x1e8\n[    7.126302]  platform_device_unregister+0x20/0x50\n[    7.131012]  aperture_detach_platform_device+0x1c/0x30\n[    7.136157]  aperture_detach_devices+0x16c/0x290\n[    7.140779]  aperture_remove_conflicting_devices+0x34/0x50\n...",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40037",
          "url": "https://www.suse.com/security/cve/CVE-2025-40037"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252819 for CVE-2025-40037",
          "url": "https://bugzilla.suse.com/1252819"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40037"
    },
    {
      "cve": "CVE-2025-40038",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40038"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false.  SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory.  Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last  enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last  enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G     U              6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n  \u003cTASK\u003e\n  dump_stack_lvl+0x7d/0xb0\n  __might_resched+0x271/0x290\n  __might_fault+0x28/0x80\n  kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n  kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n  __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n  x86_decode_insn+0xd1/0x1010 [kvm]\n  x86_emulate_instruction+0x105/0x810 [kvm]\n  __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n  handle_fastpath_invd+0xc4/0x1a0 [kvm]\n  vcpu_run+0x11a1/0x1db0 [kvm]\n  kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n  kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n  __se_sys_ioctl+0x6d/0xb0\n  do_syscall_64+0x8a/0x2c0\n  entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n  \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40038",
          "url": "https://www.suse.com/security/cve/CVE-2025-40038"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252817 for CVE-2025-40038",
          "url": "https://bugzilla.suse.com/1252817"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40038"
    },
    {
      "cve": "CVE-2025-40039",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40039"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: Fix race condition in RPC handle list access\n\nThe \u0027sess-\u003erpc_handle_list\u0027 XArray manages RPC handles within a ksmbd\nsession. Access to this list is intended to be protected by\n\u0027sess-\u003erpc_lock\u0027 (an rw_semaphore). However, the locking implementation was\nflawed, leading to potential race conditions.\n\nIn ksmbd_session_rpc_open(), the code incorrectly acquired only a read lock\nbefore calling xa_store() and xa_erase(). Since these operations modify\nthe XArray structure, a write lock is required to ensure exclusive access\nand prevent data corruption from concurrent modifications.\n\nFurthermore, ksmbd_session_rpc_method() accessed the list using xa_load()\nwithout holding any lock at all. This could lead to reading inconsistent\ndata or a potential use-after-free if an entry is concurrently removed and\nthe pointer is dereferenced.\n\nFix these issues by:\n1. Using down_write() and up_write() in ksmbd_session_rpc_open()\n   to ensure exclusive access during XArray modification, and ensuring\n   the lock is correctly released on error paths.\n2. Adding down_read() and up_read() in ksmbd_session_rpc_method()\n   to safely protect the lookup.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40039",
          "url": "https://www.suse.com/security/cve/CVE-2025-40039"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252783 for CVE-2025-40039",
          "url": "https://bugzilla.suse.com/1252783"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40039"
    },
    {
      "cve": "CVE-2025-40040",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40040"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/ksm: fix flag-dropping behavior in ksm_madvise\n\nsyzkaller discovered the following crash: (kernel BUG)\n\n[   44.607039] ------------[ cut here ]------------\n[   44.607422] kernel BUG at mm/userfaultfd.c:2067!\n[   44.608148] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI\n[   44.608814] CPU: 1 UID: 0 PID: 2475 Comm: reproducer Not tainted 6.16.0-rc6 #1 PREEMPT(none)\n[   44.609635] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\n[   44.610695] RIP: 0010:userfaultfd_release_all+0x3a8/0x460\n\n\u003csnip other registers, drop unreliable trace\u003e\n\n[   44.617726] Call Trace:\n[   44.617926]  \u003cTASK\u003e\n[   44.619284]  userfaultfd_release+0xef/0x1b0\n[   44.620976]  __fput+0x3f9/0xb60\n[   44.621240]  fput_close_sync+0x110/0x210\n[   44.622222]  __x64_sys_close+0x8f/0x120\n[   44.622530]  do_syscall_64+0x5b/0x2f0\n[   44.622840]  entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[   44.623244] RIP: 0033:0x7f365bb3f227\n\nKernel panics because it detects UFFD inconsistency during\nuserfaultfd_release_all().  Specifically, a VMA which has a valid pointer\nto vma-\u003evm_userfaultfd_ctx, but no UFFD flags in vma-\u003evm_flags.\n\nThe inconsistency is caused in ksm_madvise(): when user calls madvise()\nwith MADV_UNMEARGEABLE on a VMA that is registered for UFFD in MINOR mode,\nit accidentally clears all flags stored in the upper 32 bits of\nvma-\u003evm_flags.\n\nAssuming x86_64 kernel build, unsigned long is 64-bit and unsigned int and\nint are 32-bit wide.  This setup causes the following mishap during the \u0026=\n~VM_MERGEABLE assignment.\n\nVM_MERGEABLE is a 32-bit constant of type unsigned int, 0x8000\u00270000. \nAfter ~ is applied, it becomes 0x7fff\u0027ffff unsigned int, which is then\npromoted to unsigned long before the \u0026 operation.  This promotion fills\nupper 32 bits with leading 0s, as we\u0027re doing unsigned conversion (and\neven for a signed conversion, this wouldn\u0027t help as the leading bit is 0).\n\u0026 operation thus ends up AND-ing vm_flags with 0x0000\u00270000\u00277fff\u0027ffff\ninstead of intended 0xffff\u0027ffff\u00277fff\u0027ffff and hence accidentally clears\nthe upper 32-bits of its value.\n\nFix it by changing `VM_MERGEABLE` constant to unsigned long, using the\nBIT() macro.\n\nNote: other VM_* flags are not affected: This only happens to the\nVM_MERGEABLE flag, as the other VM_* flags are all constants of type int\nand after ~ operation, they end up with leading 1 and are thus converted\nto unsigned long with leading 1s.\n\nNote 2:\nAfter commit 31defc3b01d9 (\"userfaultfd: remove (VM_)BUG_ON()s\"), this is\nno longer a kernel BUG, but a WARNING at the same place:\n\n[   45.595973] WARNING: CPU: 1 PID: 2474 at mm/userfaultfd.c:2067\n\nbut the root-cause (flag-drop) remains the same.\n\n[akpm@linux-foundation.org: rust bindgen wasn\u0027t able to handle BIT(), from Miguel]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40040",
          "url": "https://www.suse.com/security/cve/CVE-2025-40040"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252780 for CVE-2025-40040",
          "url": "https://bugzilla.suse.com/1252780"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40040"
    },
    {
      "cve": "CVE-2025-40041",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40041"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nLoongArch: BPF: Sign-extend struct ops return values properly\n\nThe ns_bpf_qdisc selftest triggers a kernel panic:\n\n  Oops[#1]:\n  CPU 0 Unable to handle kernel paging request at virtual address 0000000000741d58, era == 90000000851b5ac0, ra == 90000000851b5aa4\n  CPU: 0 UID: 0 PID: 449 Comm: test_progs Tainted: G           OE       6.16.0+ #3 PREEMPT(full)\n  Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n  Hardware name: QEMU QEMU Virtual Machine, BIOS unknown 2/2/2022\n  pc 90000000851b5ac0 ra 90000000851b5aa4 tp 90000001076b8000 sp 90000001076bb600\n  a0 0000000000741ce8 a1 0000000000000001 a2 90000001076bb5c0 a3 0000000000000008\n  a4 90000001004c4620 a5 9000000100741ce8 a6 0000000000000000 a7 0100000000000000\n  t0 0000000000000010 t1 0000000000000000 t2 9000000104d24d30 t3 0000000000000001\n  t4 4f2317da8a7e08c4 t5 fffffefffc002f00 t6 90000001004c4620 t7 ffffffffc61c5b3d\n  t8 0000000000000000 u0 0000000000000001 s9 0000000000000050 s0 90000001075bc800\n  s1 0000000000000040 s2 900000010597c400 s3 0000000000000008 s4 90000001075bc880\n  s5 90000001075bc8f0 s6 0000000000000000 s7 0000000000741ce8 s8 0000000000000000\n     ra: 90000000851b5aa4 __qdisc_run+0xac/0x8d8\n    ERA: 90000000851b5ac0 __qdisc_run+0xc8/0x8d8\n   CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)\n   PRMD: 00000004 (PPLV0 +PIE -PWE)\n   EUEN: 00000007 (+FPE +SXE +ASXE -BTE)\n   ECFG: 00071c1d (LIE=0,2-4,10-12 VS=7)\n  ESTAT: 00010000 [PIL] (IS= ECode=1 EsubCode=0)\n   BADV: 0000000000741d58\n   PRID: 0014c010 (Loongson-64bit, Loongson-3A5000)\n  Modules linked in: bpf_testmod(OE) [last unloaded: bpf_testmod(OE)]\n  Process test_progs (pid: 449, threadinfo=000000009af02b3a, task=00000000e9ba4956)\n  Stack : 0000000000000000 90000001075bc8ac 90000000869524a8 9000000100741ce8\n          90000001075bc800 9000000100415300 90000001075bc8ac 0000000000000000\n          900000010597c400 900000008694a000 0000000000000000 9000000105b59000\n          90000001075bc800 9000000100741ce8 0000000000000050 900000008513000c\n          9000000086936000 0000000100094d4c fffffff400676208 0000000000000000\n          9000000105b59000 900000008694a000 9000000086bf0dc0 9000000105b59000\n          9000000086bf0d68 9000000085147010 90000001075be788 0000000000000000\n          9000000086bf0f98 0000000000000001 0000000000000010 9000000006015840\n          0000000000000000 9000000086be6c40 0000000000000000 0000000000000000\n          0000000000000000 4f2317da8a7e08c4 0000000000000101 4f2317da8a7e08c4\n          ...\n  Call Trace:\n  [\u003c90000000851b5ac0\u003e] __qdisc_run+0xc8/0x8d8\n  [\u003c9000000085130008\u003e] __dev_queue_xmit+0x578/0x10f0\n  [\u003c90000000853701c0\u003e] ip6_finish_output2+0x2f0/0x950\n  [\u003c9000000085374bc8\u003e] ip6_finish_output+0x2b8/0x448\n  [\u003c9000000085370b24\u003e] ip6_xmit+0x304/0x858\n  [\u003c90000000853c4438\u003e] inet6_csk_xmit+0x100/0x170\n  [\u003c90000000852b32f0\u003e] __tcp_transmit_skb+0x490/0xdd0\n  [\u003c90000000852b47fc\u003e] tcp_connect+0xbcc/0x1168\n  [\u003c90000000853b9088\u003e] tcp_v6_connect+0x580/0x8a0\n  [\u003c90000000852e7738\u003e] __inet_stream_connect+0x170/0x480\n  [\u003c90000000852e7a98\u003e] inet_stream_connect+0x50/0x88\n  [\u003c90000000850f2814\u003e] __sys_connect+0xe4/0x110\n  [\u003c90000000850f2858\u003e] sys_connect+0x18/0x28\n  [\u003c9000000085520c94\u003e] do_syscall+0x94/0x1a0\n  [\u003c9000000083df1fb8\u003e] handle_syscall+0xb8/0x158\n\n  Code: 4001ad80  2400873f  2400832d \u003c240073cc\u003e 001137ff  001133ff  6407b41f  001503cc  0280041d\n\n  ---[ end trace 0000000000000000 ]---\n\nThe bpf_fifo_dequeue prog returns a skb which is a pointer. The pointer\nis treated as a 32bit value and sign extend to 64bit in epilogue. This\nbehavior is right for most bpf prog types but wrong for struct ops which\nrequires LoongArch ABI.\n\nSo let\u0027s sign extend struct ops return values according to the LoongArch\nABI ([1]) and return value spec in function model.\n\n[1]: https://loongson.github.io/LoongArch-Documentation/LoongArch-ELF-ABI-EN.html",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40041",
          "url": "https://www.suse.com/security/cve/CVE-2025-40041"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252860 for CVE-2025-40041",
          "url": "https://bugzilla.suse.com/1252860"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40041"
    },
    {
      "cve": "CVE-2025-40042",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40042"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Fix race condition in kprobe initialization causing NULL pointer dereference\n\nThere is a critical race condition in kprobe initialization that can lead to\nNULL pointer dereference and kernel crash.\n\n[1135630.084782] Unable to handle kernel paging request at virtual address 0000710a04630000\n...\n[1135630.260314] pstate: 404003c9 (nZcv DAIF +PAN -UAO)\n[1135630.269239] pc : kprobe_perf_func+0x30/0x260\n[1135630.277643] lr : kprobe_dispatcher+0x44/0x60\n[1135630.286041] sp : ffffaeff4977fa40\n[1135630.293441] x29: ffffaeff4977fa40 x28: ffffaf015340e400\n[1135630.302837] x27: 0000000000000000 x26: 0000000000000000\n[1135630.312257] x25: ffffaf029ed108a8 x24: ffffaf015340e528\n[1135630.321705] x23: ffffaeff4977fc50 x22: ffffaeff4977fc50\n[1135630.331154] x21: 0000000000000000 x20: ffffaeff4977fc50\n[1135630.340586] x19: ffffaf015340e400 x18: 0000000000000000\n[1135630.349985] x17: 0000000000000000 x16: 0000000000000000\n[1135630.359285] x15: 0000000000000000 x14: 0000000000000000\n[1135630.368445] x13: 0000000000000000 x12: 0000000000000000\n[1135630.377473] x11: 0000000000000000 x10: 0000000000000000\n[1135630.386411] x9 : 0000000000000000 x8 : 0000000000000000\n[1135630.395252] x7 : 0000000000000000 x6 : 0000000000000000\n[1135630.403963] x5 : 0000000000000000 x4 : 0000000000000000\n[1135630.412545] x3 : 0000710a04630000 x2 : 0000000000000006\n[1135630.421021] x1 : ffffaeff4977fc50 x0 : 0000710a04630000\n[1135630.429410] Call trace:\n[1135630.434828]  kprobe_perf_func+0x30/0x260\n[1135630.441661]  kprobe_dispatcher+0x44/0x60\n[1135630.448396]  aggr_pre_handler+0x70/0xc8\n[1135630.454959]  kprobe_breakpoint_handler+0x140/0x1e0\n[1135630.462435]  brk_handler+0xbc/0xd8\n[1135630.468437]  do_debug_exception+0x84/0x138\n[1135630.475074]  el1_dbg+0x18/0x8c\n[1135630.480582]  security_file_permission+0x0/0xd0\n[1135630.487426]  vfs_write+0x70/0x1c0\n[1135630.493059]  ksys_write+0x5c/0xc8\n[1135630.498638]  __arm64_sys_write+0x24/0x30\n[1135630.504821]  el0_svc_common+0x78/0x130\n[1135630.510838]  el0_svc_handler+0x38/0x78\n[1135630.516834]  el0_svc+0x8/0x1b0\n\nkernel/trace/trace_kprobe.c: 1308\n0xffff3df8995039ec \u003ckprobe_perf_func+0x2c\u003e:     ldr     x21, [x24,#120]\ninclude/linux/compiler.h: 294\n0xffff3df8995039f0 \u003ckprobe_perf_func+0x30\u003e:     ldr     x1, [x21,x0]\n\nkernel/trace/trace_kprobe.c\n1308: head = this_cpu_ptr(call-\u003eperf_events);\n1309: if (hlist_empty(head))\n1310: \treturn 0;\n\ncrash\u003e struct trace_event_call -o\nstruct trace_event_call {\n  ...\n  [120] struct hlist_head *perf_events;  //(call-\u003eperf_event)\n  ...\n}\n\ncrash\u003e struct trace_event_call ffffaf015340e528\nstruct trace_event_call {\n  ...\n  perf_events = 0xffff0ad5fa89f088, //this value is correct, but x21 = 0\n  ...\n}\n\nRace Condition Analysis:\n\nThe race occurs between kprobe activation and perf_events initialization:\n\n  CPU0                                    CPU1\n  ====                                    ====\n  perf_kprobe_init\n    perf_trace_event_init\n      tp_event-\u003eperf_events = list;(1)\n      tp_event-\u003eclass-\u003ereg (2)\u003c- KPROBE ACTIVE\n                                          Debug exception triggers\n                                          ...\n                                          kprobe_dispatcher\n                                            kprobe_perf_func (tk-\u003etp.flags \u0026 TP_FLAG_PROFILE)\n                                              head = this_cpu_ptr(call-\u003eperf_events)(3)\n                                              (perf_events is still NULL)\n\nProblem:\n1. CPU0 executes (1) assigning tp_event-\u003eperf_events = list\n2. CPU0 executes (2) enabling kprobe functionality via class-\u003ereg()\n3. CPU1 triggers and reaches kprobe_dispatcher\n4. CPU1 checks TP_FLAG_PROFILE - condition passes (step 2 completed)\n5. CPU1 calls kprobe_perf_func() and crashes at (3) because\n   call-\u003eperf_events is still NULL\n\nCPU1 sees that kprobe functionality is enabled but does not see that\nperf_events has been assigned.\n\nAdd pairing read an\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40042",
          "url": "https://www.suse.com/security/cve/CVE-2025-40042"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252861 for CVE-2025-40042",
          "url": "https://bugzilla.suse.com/1252861"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40042"
    },
    {
      "cve": "CVE-2025-40043",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40043"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: nfc: nci: Add parameter validation for packet data\n\nSyzbot reported an uninitialized value bug in nci_init_req, which was\nintroduced by commit 5aca7966d2a7 (\"Merge tag\n\u0027perf-tools-fixes-for-v6.17-2025-09-16\u0027 of\ngit://git.kernel.org/pub/scm/linux/kernel/git/perf/perf-tools\").\n\nThis bug arises due to very limited and poor input validation\nthat was done at nic_valid_size(). This validation only\nvalidates the skb-\u003elen (directly reflects size provided at the\nuserspace interface) with the length provided in the buffer\nitself (interpreted as NCI_HEADER). This leads to the processing\nof memory content at the address assuming the correct layout\nper what opcode requires there. This leads to the accesses to\nbuffer of `skb_buff-\u003edata` which is not assigned anything yet.\n\nFollowing the same silent drop of packets of invalid sizes at\n`nic_valid_size()`, add validation of the data in the respective\nhandlers and return error values in case of failure. Release\nthe skb if error values are returned from handlers in\n`nci_nft_packet` and effectively do a silent drop\n\nPossible TODO: because we silently drop the packets, the\ncall to `nci_request` will be waiting for completion of request\nand will face timeouts. These timeouts can get excessively logged\nin the dmesg. A proper handling of them may require to export\n`nci_request_cancel` (or propagate error handling from the\nnft packets handlers).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40043",
          "url": "https://www.suse.com/security/cve/CVE-2025-40043"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252787 for CVE-2025-40043",
          "url": "https://bugzilla.suse.com/1252787"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40043"
    },
    {
      "cve": "CVE-2025-40044",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40044"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: udf: fix OOB read in lengthAllocDescs handling\n\nWhen parsing Allocation Extent Descriptor, lengthAllocDescs comes from\non-disk data and must be validated against the block size. Crafted or\ncorrupted images may set lengthAllocDescs so that the total descriptor\nlength (sizeof(allocExtDesc) + lengthAllocDescs) exceeds the buffer,\nleading udf_update_tag() to call crc_itu_t() on out-of-bounds memory and\ntrigger a KASAN use-after-free read.\n\nBUG: KASAN: use-after-free in crc_itu_t+0x1d5/0x2b0 lib/crc-itu-t.c:60\nRead of size 1 at addr ffff888041e7d000 by task syz-executor317/5309\n\nCPU: 0 UID: 0 PID: 5309 Comm: syz-executor317 Not tainted 6.12.0-rc4-syzkaller-00261-g850925a8133c #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0x169/0x550 mm/kasan/report.c:488\n kasan_report+0x143/0x180 mm/kasan/report.c:601\n crc_itu_t+0x1d5/0x2b0 lib/crc-itu-t.c:60\n udf_update_tag+0x70/0x6a0 fs/udf/misc.c:261\n udf_write_aext+0x4d8/0x7b0 fs/udf/inode.c:2179\n extent_trunc+0x2f7/0x4a0 fs/udf/truncate.c:46\n udf_truncate_tail_extent+0x527/0x7e0 fs/udf/truncate.c:106\n udf_release_file+0xc1/0x120 fs/udf/file.c:185\n __fput+0x23f/0x880 fs/file_table.c:431\n task_work_run+0x24f/0x310 kernel/task_work.c:239\n exit_task_work include/linux/task_work.h:43 [inline]\n do_exit+0xa2f/0x28e0 kernel/exit.c:939\n do_group_exit+0x207/0x2c0 kernel/exit.c:1088\n __do_sys_exit_group kernel/exit.c:1099 [inline]\n __se_sys_exit_group kernel/exit.c:1097 [inline]\n __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1097\n x64_sys_call+0x2634/0x2640 arch/x86/include/generated/asm/syscalls_64.h:232\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n \u003c/TASK\u003e\n\nValidate the computed total length against epos-\u003ebh-\u003eb_size.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40044",
          "url": "https://www.suse.com/security/cve/CVE-2025-40044"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252785 for CVE-2025-40044",
          "url": "https://bugzilla.suse.com/1252785"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40044"
    },
    {
      "cve": "CVE-2025-40045",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40045"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: codecs: wcd937x: set the comp soundwire port correctly\n\nFor some reason we endup with setting soundwire port for\nHPHL_COMP and HPHR_COMP as zero, this can potentially result\nin a memory corruption due to accessing and setting -1 th element of\nport_map array.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40045",
          "url": "https://www.suse.com/security/cve/CVE-2025-40045"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252784 for CVE-2025-40045",
          "url": "https://bugzilla.suse.com/1252784"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40045"
    },
    {
      "cve": "CVE-2025-40046",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40046"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/zcrx: fix overshooting recv limit\n\nIt\u0027s reported that sometimes a zcrx request can receive more than was\nrequested. It\u0027s caused by io_zcrx_recv_skb() adjusting desc-\u003ecount for\nall received buffers including frag lists, but then doing recursive\ncalls to process frag list skbs, which leads to desc-\u003ecount double\naccounting and underflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40046",
          "url": "https://www.suse.com/security/cve/CVE-2025-40046"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252791 for CVE-2025-40046",
          "url": "https://bugzilla.suse.com/1252791"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40046"
    },
    {
      "cve": "CVE-2025-40047",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40047"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/waitid: always prune wait queue entry in io_waitid_wait()\n\nFor a successful return, always remove our entry from the wait queue\nentry list. Previously this was skipped if a cancelation was in\nprogress, but this can race with another invocation of the wait queue\nentry callback.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40047",
          "url": "https://www.suse.com/security/cve/CVE-2025-40047"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252790 for CVE-2025-40047",
          "url": "https://bugzilla.suse.com/1252790"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40047"
    },
    {
      "cve": "CVE-2025-40048",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40048"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio_hv_generic: Let userspace take care of interrupt mask\n\nRemove the logic to set interrupt mask by default in uio_hv_generic\ndriver as the interrupt mask value is supposed to be controlled\ncompletely by the user space. If the mask bit gets changed\nby the driver, concurrently with user mode operating on the ring,\nthe mask bit may be set when it is supposed to be clear, and the\nuser-mode driver will miss an interrupt which will cause a hang.\n\nFor eg- when the driver sets inbound ring buffer interrupt mask to 1,\nthe host does not interrupt the guest on the UIO VMBus channel.\nHowever, setting the mask does not prevent the host from putting a\nmessage in the inbound ring buffer.  So let\u0027s assume that happens,\nthe host puts a message into the ring buffer but does not interrupt.\n\nSubsequently, the user space code in the guest sets the inbound ring\nbuffer interrupt mask to 0, saying \u201cHey, I\u0027m ready for interrupts\u201d.\nUser space code then calls pread() to wait for an interrupt.\nThen one of two things happens:\n\n* The host never sends another message. So the pread() waits forever.\n* The host does send another message. But because there\u0027s already a\n  message in the ring buffer, it doesn\u0027t generate an interrupt.\n  This is the correct behavior, because the host should only send an\n  interrupt when the inbound ring buffer transitions from empty to\n  not-empty. Adding an additional message to a ring buffer that is not\n  empty is not supposed to generate an interrupt on the guest.\n  Since the guest is waiting in pread() and not removing messages from\n  the ring buffer, the pread() waits forever.\n\nThis could be easily reproduced in hv_fcopy_uio_daemon if we delay\nsetting interrupt mask to 0.\n\nSimilarly if hv_uio_channel_cb() sets the interrupt_mask to 1,\nthere\u0027s a race condition. Once user space empties the inbound ring\nbuffer, but before user space sets interrupt_mask to 0, the host could\nput another message in the ring buffer but it wouldn\u0027t interrupt.\nThen the next pread() would hang.\n\nFix these by removing all instances where interrupt_mask is changed,\nwhile keeping the one in set_event() unchanged to enable userspace\ncontrol the interrupt mask by writing 0/1 to /dev/uioX.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40048",
          "url": "https://www.suse.com/security/cve/CVE-2025-40048"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252862 for CVE-2025-40048",
          "url": "https://bugzilla.suse.com/1252862"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40048"
    },
    {
      "cve": "CVE-2025-40049",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40049"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: fix uninit-value in squashfs_get_parent\n\nSyzkaller reports a \"KMSAN: uninit-value in squashfs_get_parent\" bug.\n\nThis is caused by open_by_handle_at() being called with a file handle\ncontaining an invalid parent inode number.  In particular the inode number\nis that of a symbolic link, rather than a directory.\n\nSquashfs_get_parent() gets called with that symbolic link inode, and\naccesses the parent member field.\n\n\tunsigned int parent_ino = squashfs_i(inode)-\u003eparent;\n\nBecause non-directory inodes in Squashfs do not have a parent value, this\nis uninitialised, and this causes an uninitialised value access.\n\nThe fix is to initialise parent with the invalid inode 0, which will cause\nan EINVAL error to be returned.\n\nRegular inodes used to share the parent field with the block_list_start\nfield.  This is removed in this commit to enable the parent field to\ncontain the invalid inode number 0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40049",
          "url": "https://www.suse.com/security/cve/CVE-2025-40049"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252822 for CVE-2025-40049",
          "url": "https://bugzilla.suse.com/1252822"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40049"
    },
    {
      "cve": "CVE-2025-40050",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40050"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Skip scalar adjustment for BPF_NEG if dst is a pointer\n\nIn check_alu_op(), the verifier currently calls check_reg_arg() and\nadjust_scalar_min_max_vals() unconditionally for BPF_NEG operations.\nHowever, if the destination register holds a pointer, these scalar\nadjustments are unnecessary and potentially incorrect.\n\nThis patch adds a check to skip the adjustment logic when the destination\nregister contains a pointer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40050",
          "url": "https://www.suse.com/security/cve/CVE-2025-40050"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252856 for CVE-2025-40050",
          "url": "https://bugzilla.suse.com/1252856"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40050"
    },
    {
      "cve": "CVE-2025-40051",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40051"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvhost: vringh: Modify the return value check\n\nThe return value of copy_from_iter and copy_to_iter can\u0027t be negative,\ncheck whether the copied lengths are equal.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40051",
          "url": "https://www.suse.com/security/cve/CVE-2025-40051"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252858 for CVE-2025-40051",
          "url": "https://bugzilla.suse.com/1252858"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40051"
    },
    {
      "cve": "CVE-2025-40052",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40052"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix crypto buffers in non-linear memory\n\nThe crypto API, through the scatterlist API, expects input buffers to be\nin linear memory.  We handle this with the cifs_sg_set_buf() helper\nthat converts vmalloc\u0027d memory to their corresponding pages.\n\nHowever, when we allocate our aead_request buffer (@creq in\nsmb2ops.c::crypt_message()), we do so with kvzalloc(), which possibly\nputs aead_request-\u003e__ctx in vmalloc area.\n\nAEAD algorithm then uses -\u003e__ctx for its private/internal data and\noperations, and uses sg_set_buf() for such data on a few places.\n\nThis works fine as long as @creq falls into kmalloc zone (small\nrequests) or vmalloc\u0027d memory is still within linear range.\n\nTasks\u0027 stacks are vmalloc\u0027d by default (CONFIG_VMAP_STACK=y), so too\nmany tasks will increment the base stacks\u0027 addresses to a point where\nvirt_addr_valid(buf) will fail (BUG() in sg_set_buf()) when that\nhappens.\n\nIn practice: too many parallel reads and writes on an encrypted mount\nwill trigger this bug.\n\nTo fix this, always alloc @creq with kmalloc() instead.\nAlso drop the @sensitive_size variable/arguments since\nkfree_sensitive() doesn\u0027t need it.\n\nBacktrace:\n\n[  945.272081] ------------[ cut here ]------------\n[  945.272774] kernel BUG at include/linux/scatterlist.h:209!\n[  945.273520] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC NOPTI\n[  945.274412] CPU: 7 UID: 0 PID: 56 Comm: kworker/u33:0 Kdump: loaded Not tainted 6.15.0-lku-11779-g8e9d6efccdd7-dirty #1 PREEMPT(voluntary)\n[  945.275736] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-2-gc13ff2cd-prebuilt.qemu.org 04/01/2014\n[  945.276877] Workqueue: writeback wb_workfn (flush-cifs-2)\n[  945.277457] RIP: 0010:crypto_gcm_init_common+0x1f9/0x220\n[  945.278018] Code: b0 00 00 00 48 83 c4 08 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc 48 c7 c0 00 00 00 80 48 2b 05 5c 58 e5 00 e9 58 ff ff ff \u003c0f\u003e 0b 0f 0b 0f 0b 0f 0b 0f 0b 0f 0b 48 c7 04 24 01 00 00 00 48 8b\n[  945.279992] RSP: 0018:ffffc90000a27360 EFLAGS: 00010246\n[  945.280578] RAX: 0000000000000000 RBX: ffffc90001d85060 RCX: 0000000000000030\n[  945.281376] RDX: 0000000000080000 RSI: 0000000000000000 RDI: ffffc90081d85070\n[  945.282145] RBP: ffffc90001d85010 R08: ffffc90001d85000 R09: 0000000000000000\n[  945.282898] R10: ffffc90001d85090 R11: 0000000000001000 R12: ffffc90001d85070\n[  945.283656] R13: ffff888113522948 R14: ffffc90001d85060 R15: ffffc90001d85010\n[  945.284407] FS:  0000000000000000(0000) GS:ffff8882e66cf000(0000) knlGS:0000000000000000\n[  945.285262] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  945.285884] CR2: 00007fa7ffdd31f4 CR3: 000000010540d000 CR4: 0000000000350ef0\n[  945.286683] Call Trace:\n[  945.286952]  \u003cTASK\u003e\n[  945.287184]  ? crypt_message+0x33f/0xad0 [cifs]\n[  945.287719]  crypto_gcm_encrypt+0x36/0xe0\n[  945.288152]  crypt_message+0x54a/0xad0 [cifs]\n[  945.288724]  smb3_init_transform_rq+0x277/0x300 [cifs]\n[  945.289300]  smb_send_rqst+0xa3/0x160 [cifs]\n[  945.289944]  cifs_call_async+0x178/0x340 [cifs]\n[  945.290514]  ? __pfx_smb2_writev_callback+0x10/0x10 [cifs]\n[  945.291177]  smb2_async_writev+0x3e3/0x670 [cifs]\n[  945.291759]  ? find_held_lock+0x32/0x90\n[  945.292212]  ? netfs_advance_write+0xf2/0x310\n[  945.292723]  netfs_advance_write+0xf2/0x310\n[  945.293210]  netfs_write_folio+0x346/0xcc0\n[  945.293689]  ? __pfx__raw_spin_unlock_irq+0x10/0x10\n[  945.294250]  netfs_writepages+0x117/0x460\n[  945.294724]  do_writepages+0xbe/0x170\n[  945.295152]  ? find_held_lock+0x32/0x90\n[  945.295600]  ? kvm_sched_clock_read+0x11/0x20\n[  945.296103]  __writeback_single_inode+0x56/0x4b0\n[  945.296643]  writeback_sb_inodes+0x229/0x550\n[  945.297140]  __writeback_inodes_wb+0x4c/0xe0\n[  945.297642]  wb_writeback+0x2f1/0x3f0\n[  945.298069]  wb_workfn+0x300/0x490\n[  945.298472]  process_one_work+0x1fe/0x590\n[  945.298949]  worker_thread+0x1ce/0x3c0\n[  945.299397]  ? __pfx_worker_thread+0x10/0x10\n[  945.299900]  kthr\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40052",
          "url": "https://www.suse.com/security/cve/CVE-2025-40052"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252851 for CVE-2025-40052",
          "url": "https://bugzilla.suse.com/1252851"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40052"
    },
    {
      "cve": "CVE-2025-40053",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40053"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dlink: handle copy_thresh allocation failure\n\nThe driver did not handle failure of `netdev_alloc_skb_ip_align()`.\nIf the allocation failed, dereferencing `skb-\u003eprotocol` could lead to\na NULL pointer dereference.\n\nThis patch tries to allocate `skb`. If the allocation fails, it falls\nback to the normal path.\n\nTested-on: D-Link DGE-550T Rev-A3",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40053",
          "url": "https://www.suse.com/security/cve/CVE-2025-40053"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252808 for CVE-2025-40053",
          "url": "https://bugzilla.suse.com/1252808"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40053"
    },
    {
      "cve": "CVE-2025-40054",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40054"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix UAF issue in f2fs_merge_page_bio()\n\nAs JY reported in bugzilla [1],\n\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000000\npc : [0xffffffe51d249484] f2fs_is_cp_guaranteed+0x70/0x98\nlr : [0xffffffe51d24adbc] f2fs_merge_page_bio+0x520/0x6d4\nCPU: 3 UID: 0 PID: 6790 Comm: kworker/u16:3 Tainted: P    B   W  OE      6.12.30-android16-5-maybe-dirty-4k #1 5f7701c9cbf727d1eebe77c89bbbeb3371e895e5\nTainted: [P]=PROPRIETARY_MODULE, [B]=BAD_PAGE, [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\nWorkqueue: writeback wb_workfn (flush-254:49)\nCall trace:\n f2fs_is_cp_guaranteed+0x70/0x98\n f2fs_inplace_write_data+0x174/0x2f4\n f2fs_do_write_data_page+0x214/0x81c\n f2fs_write_single_data_page+0x28c/0x764\n f2fs_write_data_pages+0x78c/0xce4\n do_writepages+0xe8/0x2fc\n __writeback_single_inode+0x4c/0x4b4\n writeback_sb_inodes+0x314/0x540\n __writeback_inodes_wb+0xa4/0xf4\n wb_writeback+0x160/0x448\n wb_workfn+0x2f0/0x5dc\n process_scheduled_works+0x1c8/0x458\n worker_thread+0x334/0x3f0\n kthread+0x118/0x1ac\n ret_from_fork+0x10/0x20\n\n[1] https://bugzilla.kernel.org/show_bug.cgi?id=220575\n\nThe panic was caused by UAF issue w/ below race condition:\n\nkworker\n- writepages\n - f2fs_write_cache_pages\n  - f2fs_write_single_data_page\n   - f2fs_do_write_data_page\n    - f2fs_inplace_write_data\n     - f2fs_merge_page_bio\n      - add_inu_page\n      : cache page #1 into bio \u0026 cache bio in\n        io-\u003ebio_list\n  - f2fs_write_single_data_page\n   - f2fs_do_write_data_page\n    - f2fs_inplace_write_data\n     - f2fs_merge_page_bio\n      - add_inu_page\n      : cache page #2 into bio which is linked\n        in io-\u003ebio_list\n\t\t\t\t\t\twrite\n\t\t\t\t\t\t- f2fs_write_begin\n\t\t\t\t\t\t: write page #1\n\t\t\t\t\t\t - f2fs_folio_wait_writeback\n\t\t\t\t\t\t  - f2fs_submit_merged_ipu_write\n\t\t\t\t\t\t   - f2fs_submit_write_bio\n\t\t\t\t\t\t   : submit bio which inclues page #1 and #2\n\n\t\t\t\t\t\tsoftware IRQ\n\t\t\t\t\t\t- f2fs_write_end_io\n\t\t\t\t\t\t - fscrypt_free_bounce_page\n\t\t\t\t\t\t : freed bounced page which belongs to page #2\n      - inc_page_count( , WB_DATA_TYPE(data_folio), false)\n      : data_folio points to fio-\u003eencrypted_page\n        the bounced page can be freed before\n        accessing it in f2fs_is_cp_guarantee()\n\nIt can reproduce w/ below testcase:\nRun below script in shell #1:\nfor ((i=1;i\u003e0;i++)) do xfs_io -f /mnt/f2fs/enc/file \\\n-c \"pwrite 0 32k\" -c \"fdatasync\"\n\nRun below script in shell #2:\nfor ((i=1;i\u003e0;i++)) do xfs_io -f /mnt/f2fs/enc/file \\\n-c \"pwrite 0 32k\" -c \"fdatasync\"\n\nSo, in f2fs_merge_page_bio(), let\u0027s avoid using fio-\u003eencrypted_page after\ncommit page into internal ipu cache.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40054",
          "url": "https://www.suse.com/security/cve/CVE-2025-40054"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252853 for CVE-2025-40054",
          "url": "https://bugzilla.suse.com/1252853"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40054"
    },
    {
      "cve": "CVE-2025-40055",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40055"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time.  Set \"lc\" to NULL on this\npath to avoid a double free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40055",
          "url": "https://www.suse.com/security/cve/CVE-2025-40055"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252821 for CVE-2025-40055",
          "url": "https://bugzilla.suse.com/1252821"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40055"
    },
    {
      "cve": "CVE-2025-40056",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40056"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvhost: vringh: Fix copy_to_iter return value check\n\nThe return value of copy_to_iter can\u0027t be negative, check whether the\ncopied length is equal to the requested length instead of checking for\nnegative values.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40056",
          "url": "https://www.suse.com/security/cve/CVE-2025-40056"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252826 for CVE-2025-40056",
          "url": "https://bugzilla.suse.com/1252826"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40056"
    },
    {
      "cve": "CVE-2025-40057",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40057"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: Add a upper bound on max_vclocks\n\nsyzbot reported WARNING in max_vclocks_store.\n\nThis occurs when the argument max is too large for kcalloc to handle.\n\nExtend the guard to guard against values that are too large for\nkcalloc",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40057",
          "url": "https://www.suse.com/security/cve/CVE-2025-40057"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252825 for CVE-2025-40057",
          "url": "https://bugzilla.suse.com/1252825"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40057"
    },
    {
      "cve": "CVE-2025-40058",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40058"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: Disallow dirty tracking if incoherent page walk\n\nDirty page tracking relies on the IOMMU atomically updating the dirty bit\nin the paging-structure entry. For this operation to succeed, the paging-\nstructure memory must be coherent between the IOMMU and the CPU. In\nanother word, if the iommu page walk is incoherent, dirty page tracking\ndoesn\u0027t work.\n\nThe Intel VT-d specification, Section 3.10 \"Snoop Behavior\" states:\n\n\"Remapping hardware encountering the need to atomically update A/EA/D bits\n in a paging-structure entry that is not snooped will result in a non-\n recoverable fault.\"\n\nTo prevent an IOMMU from being incorrectly configured for dirty page\ntracking when it is operating in an incoherent mode, mark SSADS as\nsupported only when both ecap_slads and ecap_smpwc are supported.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40058",
          "url": "https://www.suse.com/security/cve/CVE-2025-40058"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252854 for CVE-2025-40058",
          "url": "https://bugzilla.suse.com/1252854"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40058"
    },
    {
      "cve": "CVE-2025-40059",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40059"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40059",
          "url": "https://www.suse.com/security/cve/CVE-2025-40059"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252809 for CVE-2025-40059",
          "url": "https://bugzilla.suse.com/1252809"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40059"
    },
    {
      "cve": "CVE-2025-40060",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40060"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: trbe: Return NULL pointer for allocation failures\n\nWhen the TRBE driver fails to allocate a buffer, it currently returns\nthe error code \"-ENOMEM\". However, the caller etm_setup_aux() only\nchecks for a NULL pointer, so it misses the error. As a result, the\ndriver continues and eventually causes a kernel panic.\n\nFix this by returning a NULL pointer from arm_trbe_alloc_buffer() on\nallocation failures. This allows that the callers can properly handle\nthe failure.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40060",
          "url": "https://www.suse.com/security/cve/CVE-2025-40060"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252848 for CVE-2025-40060",
          "url": "https://bugzilla.suse.com/1252848"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40060"
    },
    {
      "cve": "CVE-2025-40061",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40061"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix race in do_task() when draining\n\nWhen do_task() exhausts its iteration budget (!ret), it sets the state\nto TASK_STATE_IDLE to reschedule, without a secondary check on the\ncurrent task-\u003estate. This can overwrite the TASK_STATE_DRAINING state\nset by a concurrent call to rxe_cleanup_task() or rxe_disable_task().\n\nWhile state changes are protected by a spinlock, both rxe_cleanup_task()\nand rxe_disable_task() release the lock while waiting for the task to\nfinish draining in the while(!is_done(task)) loop. The race occurs if\ndo_task() hits its iteration limit and acquires the lock in this window.\nThe cleanup logic may then proceed while the task incorrectly\nreschedules itself, leading to a potential use-after-free.\n\nThis bug was introduced during the migration from tasklets to workqueues,\nwhere the special handling for the draining case was lost.\n\nFix this by restoring the original pre-migration behavior. If the state is\nTASK_STATE_DRAINING when iterations are exhausted, set cont to 1 to\nforce a new loop iteration. This allows the task to finish its work, so\nthat a subsequent iteration can reach the switch statement and correctly\ntransition the state to TASK_STATE_DRAINED, stopping the task as intended.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40061",
          "url": "https://www.suse.com/security/cve/CVE-2025-40061"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252849 for CVE-2025-40061",
          "url": "https://bugzilla.suse.com/1252849"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40061"
    },
    {
      "cve": "CVE-2025-40062",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40062"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: hisilicon/qm - set NULL to qm-\u003edebug.qm_diff_regs\n\nWhen the initialization of qm-\u003edebug.acc_diff_reg fails,\nthe probe process does not exit. However, after qm-\u003edebug.qm_diff_regs is\nfreed, it is not set to NULL. This can lead to a double free when the\nremove process attempts to free it again. Therefore, qm-\u003edebug.qm_diff_regs\nshould be set to NULL after it is freed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40062",
          "url": "https://www.suse.com/security/cve/CVE-2025-40062"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252850 for CVE-2025-40062",
          "url": "https://bugzilla.suse.com/1252850"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40062"
    },
    {
      "cve": "CVE-2025-40063",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40063"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: comp - Use same definition of context alloc and free ops\n\nIn commit 42d9f6c77479 (\"crypto: acomp - Move scomp stream allocation\ncode into acomp\"), the crypto_acomp_streams struct was made to rely on\nhaving the alloc_ctx and free_ctx operations defined in the same order\nas the scomp_alg struct. But in that same commit, the alloc_ctx and\nfree_ctx members of scomp_alg may be randomized by structure layout\nrandomization, since they are contained in a pure ops structure\n(containing only function pointers). If the pointers within scomp_alg\nare randomized, but those in crypto_acomp_streams are not, then\nthe order may no longer match. This fixes the problem by removing the\nunion from scomp_alg so that both crypto_acomp_streams and scomp_alg\nwill share the same definition of alloc_ctx and free_ctx, ensuring\nthey will always have the same layout.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40063",
          "url": "https://www.suse.com/security/cve/CVE-2025-40063"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252844 for CVE-2025-40063",
          "url": "https://bugzilla.suse.com/1252844"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40063"
    },
    {
      "cve": "CVE-2025-40064",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40064"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held.  Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40064",
          "url": "https://www.suse.com/security/cve/CVE-2025-40064"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252845 for CVE-2025-40064",
          "url": "https://bugzilla.suse.com/1252845"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40064"
    },
    {
      "cve": "CVE-2025-40065",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40065"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRISC-V: KVM: Write hgatp register with valid mode bits\n\nAccording to the RISC-V Privileged Architecture Spec, when MODE=Bare\nis selected,software must write zero to the remaining fields of hgatp.\n\nWe have detected the valid mode supported by the HW before, So using a\nvalid mode to detect how many vmid bits are supported.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40065",
          "url": "https://www.suse.com/security/cve/CVE-2025-40065"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252846 for CVE-2025-40065",
          "url": "https://bugzilla.suse.com/1252846"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40065"
    },
    {
      "cve": "CVE-2025-40066",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40066"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mt76: mt7996: Check phy before init msta_link in mt7996_mac_sta_add_links()\n\nIn order to avoid a possible NULL pointer dereference in\nmt7996_mac_sta_init_link routine, move the phy pointer check before\nrunning mt7996_mac_sta_init_link() in mt7996_mac_sta_add_links routine.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40066",
          "url": "https://www.suse.com/security/cve/CVE-2025-40066"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252842 for CVE-2025-40066",
          "url": "https://bugzilla.suse.com/1252842"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40066"
    },
    {
      "cve": "CVE-2025-40067",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40067"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: reject index allocation if $BITMAP is empty but blocks exist\n\nIndex allocation requires at least one bit in the $BITMAP attribute to\ntrack usage of index entries. If the bitmap is empty while index blocks\nare already present, this reflects on-disk corruption.\n\nsyzbot triggered this condition using a malformed NTFS image. During a\nrename() operation involving a long filename (which spans multiple\nindex entries), the empty bitmap allowed the name to be added without\nvalid tracking. Subsequent deletion of the original entry failed with\n-ENOENT, due to unexpected index state.\n\nReject such cases by verifying that the bitmap is not empty when index\nblocks exist.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40067",
          "url": "https://www.suse.com/security/cve/CVE-2025-40067"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252840 for CVE-2025-40067",
          "url": "https://bugzilla.suse.com/1252840"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40067"
    },
    {
      "cve": "CVE-2025-40068",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40068"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: ntfs3: Fix integer overflow in run_unpack()\n\nThe MFT record relative to the file being opened contains its runlist,\nan array containing information about the file\u0027s location on the physical\ndisk. Analysis of all Call Stack paths showed that the values of the\nrunlist array, from which LCNs are calculated, are not validated before\nrun_unpack function.\n\nThe run_unpack function decodes the compressed runlist data format\nfrom MFT attributes (for example, $DATA), converting them into a runs_tree\nstructure, which describes the mapping of virtual clusters (VCN) to\nlogical clusters (LCN). The NTFS3 subsystem also has a shortcut for\ndeleting files from MFT records - in this case, the RUN_DEALLOCATE\ncommand is sent to the run_unpack input, and the function logic\nprovides that all data transferred to the runlist about file or\ndirectory is deleted without creating a runs_tree structure.\n\nSubstituting the runlist in the $DATA attribute of the MFT record for an\narbitrary file can lead either to access to arbitrary data on the disk\nbypassing access checks to them (since the inode access check\noccurs above) or to destruction of arbitrary data on the disk.\n\nAdd overflow check for addition operation.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40068",
          "url": "https://www.suse.com/security/cve/CVE-2025-40068"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252843 for CVE-2025-40068",
          "url": "https://bugzilla.suse.com/1252843"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40068"
    },
    {
      "cve": "CVE-2025-40069",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40069"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm: Fix obj leak in VM_BIND error path\n\nIf we fail a handle-lookup part way thru, we need to drop the already\nobtained obj references.\n\nPatchwork: https://patchwork.freedesktop.org/patch/669784/",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40069",
          "url": "https://www.suse.com/security/cve/CVE-2025-40069"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252831 for CVE-2025-40069",
          "url": "https://bugzilla.suse.com/1252831"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40069"
    },
    {
      "cve": "CVE-2025-40070",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40070"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n  ------------[ cut here ]------------\n  WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n  Modules linked in:\n  CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n  RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n  Call Trace:\n   \u003cTASK\u003e\n   kobject_cleanup+0x136/0x410 lib/kobject.c:689\n   kobject_release lib/kobject.c:720 [inline]\n   kref_put include/linux/kref.h:65 [inline]\n   kobject_put+0xe9/0x130 lib/kobject.c:737\n   put_device+0x24/0x30 drivers/base/core.c:3797\n   pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n   pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n   pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n   tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n   tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n   tiocsetd drivers/tty/tty_io.c:2429 [inline]\n   tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n   vfs_ioctl fs/ioctl.c:51 [inline]\n   __do_sys_ioctl fs/ioctl.c:598 [inline]\n   __se_sys_ioctl fs/ioctl.c:584 [inline]\n   __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n   do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n   entry_SYSCALL_64_after_hwframe+0x76/0x7e\n   \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40070",
          "url": "https://www.suse.com/security/cve/CVE-2025-40070"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252836 for CVE-2025-40070",
          "url": "https://bugzilla.suse.com/1252836"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40070"
    },
    {
      "cve": "CVE-2025-40071",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40071"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: n_gsm: Don\u0027t block input queue by waiting MSC\n\nCurrently gsm_queue() processes incoming frames and when opening\na DLC channel it calls gsm_dlci_open() which calls gsm_modem_update().\nIf basic mode is used it calls gsm_modem_upd_via_msc() and it\ncannot block the input queue by waiting the response to come\ninto the same input queue.\n\nInstead allow sending Modem Status Command without waiting for remote\nend to respond. Define a new function gsm_modem_send_initial_msc()\nfor this purpose. As MSC is only valid for basic encoding, it does\nnot do anything for advanced or when convergence layer type 2 is used.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40071",
          "url": "https://www.suse.com/security/cve/CVE-2025-40071"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252797 for CVE-2025-40071",
          "url": "https://bugzilla.suse.com/1252797"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40071"
    },
    {
      "cve": "CVE-2025-40072",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40072"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfanotify: Validate the return value of mnt_ns_from_dentry() before dereferencing\n\nThe function do_fanotify_mark() does not validate if\nmnt_ns_from_dentry() returns NULL before dereferencing mntns-\u003euser_ns.\nThis causes a NULL pointer dereference in do_fanotify_mark() if the\npath is not a mount namespace object.\n\nFix this by checking mnt_ns_from_dentry()\u0027s return value before\ndereferencing it.\n\nBefore the patch\n\n$ gcc fanotify_nullptr.c -o fanotify_nullptr\n$ mkdir A\n$ ./fanotify_nullptr\nFanotify fd: 3\nfanotify_mark: Operation not permitted\n$ unshare -Urm\nFanotify fd: 3\nKilled\n\nint main(void){\n    int ffd;\n    ffd = fanotify_init(FAN_CLASS_NOTIF | FAN_REPORT_MNT, 0);\n    if(ffd \u003c 0){\n        perror(\"fanotify_init\");\n        exit(EXIT_FAILURE);\n    }\n\n    printf(\"Fanotify fd: %d\\n\",ffd);\n\n    if(fanotify_mark(ffd, FAN_MARK_ADD | FAN_MARK_MNTNS,\nFAN_MNT_ATTACH, AT_FDCWD, \"A\") \u003c 0){\n        perror(\"fanotify_mark\");\n        exit(EXIT_FAILURE);\n    }\n\nreturn 0;\n}\n\nAfter the patch\n\n$ gcc fanotify_nullptr.c -o fanotify_nullptr\n$ mkdir A\n$ ./fanotify_nullptr\nFanotify fd: 3\nfanotify_mark: Operation not permitted\n$ unshare -Urm\nFanotify fd: 3\nfanotify_mark: Invalid argument\n\n[   25.694973] BUG: kernel NULL pointer dereference, address: 0000000000000038\n[   25.695006] #PF: supervisor read access in kernel mode\n[   25.695012] #PF: error_code(0x0000) - not-present page\n[   25.695017] PGD 109a30067 P4D 109a30067 PUD 142b46067 PMD 0\n[   25.695025] Oops: Oops: 0000 [#1] SMP NOPTI\n[   25.695032] CPU: 4 UID: 1000 PID: 1478 Comm: fanotify_nullpt Not\ntainted 6.17.0-rc4 #1 PREEMPT(lazy)\n[   25.695040] Hardware name: VMware, Inc. VMware Virtual\nPlatform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020\n[   25.695049] RIP: 0010:do_fanotify_mark+0x817/0x950\n[   25.695066] Code: 04 00 00 e9 45 fd ff ff 48 8b 7c 24 48 4c 89 54\n24 18 4c 89 5c 24 10 4c 89 0c 24 e8 b3 11 fc ff 4c 8b 54 24 18 4c 8b\n5c 24 10 \u003c48\u003e 8b 78 38 4c 8b 0c 24 49 89 c4 e9 13 fd ff ff 8b 4c 24 28\n85 c9\n[   25.695081] RSP: 0018:ffffd31c469e3c08 EFLAGS: 00010203\n[   25.695104] RAX: 0000000000000000 RBX: 0000000001000000 RCX: ffff8eb48aebd220\n[   25.695110] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8eb4835e8180\n[   25.695115] RBP: 0000000000000111 R08: 0000000000000000 R09: 0000000000000000\n[   25.695142] R10: ffff8eb48a7d56c0 R11: ffff8eb482bede00 R12: 00000000004012a7\n[   25.695148] R13: 0000000000000110 R14: 0000000000000001 R15: ffff8eb48a7d56c0\n[   25.695154] FS:  00007f8733bda740(0000) GS:ffff8eb61ce5f000(0000)\nknlGS:0000000000000000\n[   25.695162] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[   25.695170] CR2: 0000000000000038 CR3: 0000000136994006 CR4: 00000000003706f0\n[   25.695201] Call Trace:\n[   25.695209]  \u003cTASK\u003e\n[   25.695215]  __x64_sys_fanotify_mark+0x1f/0x30\n[   25.695222]  do_syscall_64+0x82/0x2c0\n...",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40072",
          "url": "https://www.suse.com/security/cve/CVE-2025-40072"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252796 for CVE-2025-40072",
          "url": "https://bugzilla.suse.com/1252796"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40072"
    },
    {
      "cve": "CVE-2025-40073",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40073"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm: Do not validate SSPP when it is not ready\n\nCurrent code will validate current plane and previous plane to\nconfirm they can share a SSPP with multi-rect mode. The SSPP\nis already allocated for previous plane, while current plane\nis not associated with any SSPP yet. Null pointer is referenced\nwhen validating the SSPP of current plane. Skip SSPP validation\nfor current plane.\n\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000020\nMem abort info:\n  ESR = 0x0000000096000004\n  EC = 0x25: DABT (current EL), IL = 32 bits\n  SET = 0, FnV = 0\n  EA = 0, S1PTW = 0\n  FSC = 0x04: level 0 translation fault\nData abort info:\n  ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000\n  CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n  GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\nuser pgtable: 4k pages, 48-bit VAs, pgdp=0000000888ac3000\n[0000000000000020] pgd=0000000000000000, p4d=0000000000000000\nInternal error: Oops: 0000000096000004 [#1]  SMP\nModules linked in:\nCPU: 4 UID: 0 PID: 1891 Comm: modetest Tainted: G S                  6.15.0-rc2-g3ee3f6e1202e #335 PREEMPT\nTainted: [S]=CPU_OUT_OF_SPEC\nHardware name: SM8650 EV1 rev1 4slam 2et (DT)\npstate: 63400009 (nZCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\npc : dpu_plane_is_multirect_capable+0x68/0x90\nlr : dpu_assign_plane_resources+0x288/0x410\nsp : ffff800093dcb770\nx29: ffff800093dcb770 x28: 0000000000002000 x27: ffff000817c6c000\nx26: ffff000806b46368 x25: ffff0008013f6080 x24: ffff00080cbf4800\nx23: ffff000810842680 x22: ffff0008013f1080 x21: ffff00080cc86080\nx20: ffff000806b463b0 x19: ffff00080cbf5a00 x18: 00000000ffffffff\nx17: 707a5f657a696c61 x16: 0000000000000003 x15: 0000000000002200\nx14: 00000000ffffffff x13: 00aaaaaa00aaaaaa x12: 0000000000000000\nx11: ffff000817c6e2b8 x10: 0000000000000000 x9 : ffff80008106a950\nx8 : ffff00080cbf48f4 x7 : 0000000000000000 x6 : 0000000000000000\nx5 : 0000000000000000 x4 : 0000000000000438 x3 : 0000000000000438\nx2 : ffff800082e245e0 x1 : 0000000000000008 x0 : 0000000000000000\nCall trace:\n dpu_plane_is_multirect_capable+0x68/0x90 (P)\n dpu_crtc_atomic_check+0x5bc/0x650\n drm_atomic_helper_check_planes+0x13c/0x220\n drm_atomic_helper_check+0x58/0xb8\n msm_atomic_check+0xd8/0xf0\n drm_atomic_check_only+0x4a8/0x968\n drm_atomic_commit+0x50/0xd8\n drm_atomic_helper_update_plane+0x140/0x188\n __setplane_atomic+0xfc/0x148\n drm_mode_setplane+0x164/0x378\n drm_ioctl_kernel+0xc0/0x140\n drm_ioctl+0x20c/0x500\n __arm64_sys_ioctl+0xbc/0xf8\n invoke_syscall+0x50/0x120\n el0_svc_common.constprop.0+0x48/0xf8\n do_el0_svc+0x28/0x40\n el0_svc+0x30/0xd0\n el0t_64_sync_handler+0x144/0x168\n el0t_64_sync+0x198/0x1a0\nCode: b9402021 370fffc1 f9401441 3707ff81 (f94010a1)\n---[ end trace 0000000000000000 ]---\n\nPatchwork: https://patchwork.freedesktop.org/patch/669224/",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40073",
          "url": "https://www.suse.com/security/cve/CVE-2025-40073"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252798 for CVE-2025-40073",
          "url": "https://bugzilla.suse.com/1252798"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40073"
    },
    {
      "cve": "CVE-2025-40074",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40074"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40074",
          "url": "https://www.suse.com/security/cve/CVE-2025-40074"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252794 for CVE-2025-40074",
          "url": "https://bugzilla.suse.com/1252794"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40074"
    },
    {
      "cve": "CVE-2025-40075",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40075"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40075",
          "url": "https://www.suse.com/security/cve/CVE-2025-40075"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252795 for CVE-2025-40075",
          "url": "https://bugzilla.suse.com/1252795"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40075"
    },
    {
      "cve": "CVE-2025-40076",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40076"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: rcar-host: Pass proper IRQ domain to generic_handle_domain_irq()\n\nStarting with commit dd26c1a23fd5 (\"PCI: rcar-host: Switch to\nmsi_create_parent_irq_domain()\"), the MSI parent IRQ domain is NULL because\nthe object of type struct irq_domain_info passed to:\n\nmsi_create_parent_irq_domain() -\u003e\n  irq_domain_instantiate()() -\u003e\n    __irq_domain_instantiate()\n\nhas no reference to the parent IRQ domain. Using msi-\u003edomain-\u003eparent as an\nargument for generic_handle_domain_irq() leads to below error:\n\n\t\"Unable to handle kernel NULL pointer dereference at virtual address\"\n\nThis error was identified while switching the upcoming RZ/G3S PCIe host\ncontroller driver to msi_create_parent_irq_domain() (which was using a\nsimilar pattern to handle MSIs (see link section)), but it was not tested\non hardware using the pcie-rcar-host controller driver due to lack of\nhardware.\n\n[mani: reworded subject and description]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40076",
          "url": "https://www.suse.com/security/cve/CVE-2025-40076"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252792 for CVE-2025-40076",
          "url": "https://bugzilla.suse.com/1252792"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40076"
    },
    {
      "cve": "CVE-2025-40077",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40077"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to avoid overflow while left shift operation\n\nShould cast type of folio-\u003eindex from pgoff_t to loff_t to avoid overflow\nwhile left shift operation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40077",
          "url": "https://www.suse.com/security/cve/CVE-2025-40077"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252782 for CVE-2025-40077",
          "url": "https://bugzilla.suse.com/1252782"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40077"
    },
    {
      "cve": "CVE-2025-40078",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40078"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Explicitly check accesses to bpf_sock_addr\n\nSyzkaller found a kernel warning on the following sock_addr program:\n\n    0: r0 = 0\n    1: r2 = *(u32 *)(r1 +60)\n    2: exit\n\nwhich triggers:\n\n    verifier bug: error during ctx access conversion (0)\n\nThis is happening because offset 60 in bpf_sock_addr corresponds to an\nimplicit padding of 4 bytes, right after msg_src_ip4. Access to this\npadding isn\u0027t rejected in sock_addr_is_valid_access and it thus later\nfails to convert the access.\n\nThis patch fixes it by explicitly checking the various fields of\nbpf_sock_addr in sock_addr_is_valid_access.\n\nI checked the other ctx structures and is_valid_access functions and\ndidn\u0027t find any other similar cases. Other cases of (properly handled)\npadding are covered in new tests in a subsequent patch.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40078",
          "url": "https://www.suse.com/security/cve/CVE-2025-40078"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252789 for CVE-2025-40078",
          "url": "https://bugzilla.suse.com/1252789"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40078"
    },
    {
      "cve": "CVE-2025-40079",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40079"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nriscv, bpf: Sign extend struct ops return values properly\n\nThe ns_bpf_qdisc selftest triggers a kernel panic:\n\n    Unable to handle kernel paging request at virtual address ffffffffa38dbf58\n    Current test_progs pgtable: 4K pagesize, 57-bit VAs, pgdp=0x00000001109cc000\n    [ffffffffa38dbf58] pgd=000000011fffd801, p4d=000000011fffd401, pud=000000011fffd001, pmd=0000000000000000\n    Oops [#1]\n    Modules linked in: bpf_testmod(OE) xt_conntrack nls_iso8859_1 [...] [last unloaded: bpf_testmod(OE)]\n    CPU: 1 UID: 0 PID: 23584 Comm: test_progs Tainted: G        W  OE       6.17.0-rc1-g2465bb83e0b4 #1 NONE\n    Tainted: [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n    Hardware name: Unknown Unknown Product/Unknown Product, BIOS 2024.01+dfsg-1ubuntu5.1 01/01/2024\n    epc : __qdisc_run+0x82/0x6f0\n     ra : __qdisc_run+0x6e/0x6f0\n    epc : ffffffff80bd5c7a ra : ffffffff80bd5c66 sp : ff2000000eecb550\n     gp : ffffffff82472098 tp : ff60000096895940 t0 : ffffffff8001f180\n     t1 : ffffffff801e1664 t2 : 0000000000000000 s0 : ff2000000eecb5d0\n     s1 : ff60000093a6a600 a0 : ffffffffa38dbee8 a1 : 0000000000000001\n     a2 : ff2000000eecb510 a3 : 0000000000000001 a4 : 0000000000000000\n     a5 : 0000000000000010 a6 : 0000000000000000 a7 : 0000000000735049\n     s2 : ffffffffa38dbee8 s3 : 0000000000000040 s4 : ff6000008bcda000\n     s5 : 0000000000000008 s6 : ff60000093a6a680 s7 : ff60000093a6a6f0\n     s8 : ff60000093a6a6ac s9 : ff60000093140000 s10: 0000000000000000\n     s11: ff2000000eecb9d0 t3 : 0000000000000000 t4 : 0000000000ff0000\n     t5 : 0000000000000000 t6 : ff60000093a6a8b6\n    status: 0000000200000120 badaddr: ffffffffa38dbf58 cause: 000000000000000d\n    [\u003cffffffff80bd5c7a\u003e] __qdisc_run+0x82/0x6f0\n    [\u003cffffffff80b6fe58\u003e] __dev_queue_xmit+0x4c0/0x1128\n    [\u003cffffffff80b80ae0\u003e] neigh_resolve_output+0xd0/0x170\n    [\u003cffffffff80d2daf6\u003e] ip6_finish_output2+0x226/0x6c8\n    [\u003cffffffff80d31254\u003e] ip6_finish_output+0x10c/0x2a0\n    [\u003cffffffff80d31446\u003e] ip6_output+0x5e/0x178\n    [\u003cffffffff80d2e232\u003e] ip6_xmit+0x29a/0x608\n    [\u003cffffffff80d6f4c6\u003e] inet6_csk_xmit+0xe6/0x140\n    [\u003cffffffff80c985e4\u003e] __tcp_transmit_skb+0x45c/0xaa8\n    [\u003cffffffff80c995fe\u003e] tcp_connect+0x9ce/0xd10\n    [\u003cffffffff80d66524\u003e] tcp_v6_connect+0x4ac/0x5e8\n    [\u003cffffffff80cc19b8\u003e] __inet_stream_connect+0xd8/0x318\n    [\u003cffffffff80cc1c36\u003e] inet_stream_connect+0x3e/0x68\n    [\u003cffffffff80b42b20\u003e] __sys_connect_file+0x50/0x88\n    [\u003cffffffff80b42bee\u003e] __sys_connect+0x96/0xc8\n    [\u003cffffffff80b42c40\u003e] __riscv_sys_connect+0x20/0x30\n    [\u003cffffffff80e5bcae\u003e] do_trap_ecall_u+0x256/0x378\n    [\u003cffffffff80e69af2\u003e] handle_exception+0x14a/0x156\n    Code: 892a 0363 1205 489c 8bc1 c7e5 2d03 084a 2703 080a (2783) 0709\n    ---[ end trace 0000000000000000 ]---\n\nThe bpf_fifo_dequeue prog returns a skb which is a pointer. The pointer\nis treated as a 32bit value and sign extend to 64bit in epilogue. This\nbehavior is right for most bpf prog types but wrong for struct ops which\nrequires RISC-V ABI.\n\nSo let\u0027s sign extend struct ops return values according to the function\nmodel and RISC-V ABI([0]).\n\n  [0]: https://riscv.org/wp-content/uploads/2024/12/riscv-calling.pdf",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40079",
          "url": "https://www.suse.com/security/cve/CVE-2025-40079"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252786 for CVE-2025-40079",
          "url": "https://bugzilla.suse.com/1252786"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40079"
    },
    {
      "cve": "CVE-2025-40080",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40080"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: restrict sockets to TCP and UDP\n\nRecently, syzbot started to abuse NBD with all kinds of sockets.\n\nCommit cf1b2326b734 (\"nbd: verify socket is supported during setup\")\nmade sure the socket supported a shutdown() method.\n\nExplicitely accept TCP and UNIX stream sockets.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40080",
          "url": "https://www.suse.com/security/cve/CVE-2025-40080"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252774 for CVE-2025-40080",
          "url": "https://bugzilla.suse.com/1252774"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40080"
    },
    {
      "cve": "CVE-2025-40081",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40081"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf: arm_spe: Prevent overflow in PERF_IDX2OFF()\n\nCast nr_pages to unsigned long to avoid overflow when handling large\nAUX buffer sizes (\u003e= 2 GiB).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40081",
          "url": "https://www.suse.com/security/cve/CVE-2025-40081"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252776 for CVE-2025-40081",
          "url": "https://bugzilla.suse.com/1252776"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40081"
    },
    {
      "cve": "CVE-2025-40082",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40082"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()\n\nBUG: KASAN: slab-out-of-bounds in hfsplus_uni2asc+0xa71/0xb90 fs/hfsplus/unicode.c:186\nRead of size 2 at addr ffff8880289ef218 by task syz.6.248/14290\n\nCPU: 0 UID: 0 PID: 14290 Comm: syz.6.248 Not tainted 6.16.4 #1 PREEMPT(full)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x116/0x1b0 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x5f0 mm/kasan/report.c:482\n kasan_report+0xca/0x100 mm/kasan/report.c:595\n hfsplus_uni2asc+0xa71/0xb90 fs/hfsplus/unicode.c:186\n hfsplus_listxattr+0x5b6/0xbd0 fs/hfsplus/xattr.c:738\n vfs_listxattr+0xbe/0x140 fs/xattr.c:493\n listxattr+0xee/0x190 fs/xattr.c:924\n filename_listxattr fs/xattr.c:958 [inline]\n path_listxattrat+0x143/0x360 fs/xattr.c:988\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcb/0x4c0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fe0e9fae16d\nCode: 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fe0eae67f98 EFLAGS: 00000246 ORIG_RAX: 00000000000000c3\nRAX: ffffffffffffffda RBX: 00007fe0ea205fa0 RCX: 00007fe0e9fae16d\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000000\nRBP: 00007fe0ea0480f0 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007fe0ea206038 R14: 00007fe0ea205fa0 R15: 00007fe0eae48000\n \u003c/TASK\u003e\n\nAllocated by task 14290:\n kasan_save_stack+0x24/0x50 mm/kasan/common.c:47\n kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394\n kasan_kmalloc include/linux/kasan.h:260 [inline]\n __do_kmalloc_node mm/slub.c:4333 [inline]\n __kmalloc_noprof+0x219/0x540 mm/slub.c:4345\n kmalloc_noprof include/linux/slab.h:909 [inline]\n hfsplus_find_init+0x95/0x1f0 fs/hfsplus/bfind.c:21\n hfsplus_listxattr+0x331/0xbd0 fs/hfsplus/xattr.c:697\n vfs_listxattr+0xbe/0x140 fs/xattr.c:493\n listxattr+0xee/0x190 fs/xattr.c:924\n filename_listxattr fs/xattr.c:958 [inline]\n path_listxattrat+0x143/0x360 fs/xattr.c:988\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcb/0x4c0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nWhen hfsplus_uni2asc is called from hfsplus_listxattr,\nit actually passes in a struct hfsplus_attr_unistr*.\nThe size of the corresponding structure is different from that of hfsplus_unistr,\nso the previous fix (94458781aee6) is insufficient.\nThe pointer on the unicode buffer is still going beyond the allocated memory.\n\nThis patch introduces two warpper functions hfsplus_uni2asc_xattr_str and\nhfsplus_uni2asc_str to process two unicode buffers,\nstruct hfsplus_attr_unistr* and struct hfsplus_unistr* respectively.\nWhen ustrlen value is bigger than the allocated memory size,\nthe ustrlen value is limited to an safe size.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40082",
          "url": "https://www.suse.com/security/cve/CVE-2025-40082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252775 for CVE-2025-40082",
          "url": "https://bugzilla.suse.com/1252775"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40082"
    },
    {
      "cve": "CVE-2025-40084",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40084"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: transport_ipc: validate payload size before reading handle\n\nhandle_response() dereferences the payload as a 4-byte handle without\nverifying that the declared payload size is at least 4 bytes. A malformed\nor truncated message from ksmbd.mountd can lead to a 4-byte read past the\ndeclared payload size. Validate the size before dereferencing.\n\nThis is a minimal fix to guard the initial handle read.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40084",
          "url": "https://www.suse.com/security/cve/CVE-2025-40084"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252874 for CVE-2025-40084",
          "url": "https://bugzilla.suse.com/1252874"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40084"
    },
    {
      "cve": "CVE-2025-40085",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40085"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix NULL pointer deference in try_to_register_card\n\nIn try_to_register_card(), the return value of usb_ifnum_to_if() is\npassed directly to usb_interface_claimed() without a NULL check, which\nwill lead to a NULL pointer dereference when creating an invalid\nUSB audio device. Fix this by adding a check to ensure the interface\npointer is valid before passing it to usb_interface_claimed().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40085",
          "url": "https://www.suse.com/security/cve/CVE-2025-40085"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252873 for CVE-2025-40085",
          "url": "https://bugzilla.suse.com/1252873"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40085"
    },
    {
      "cve": "CVE-2025-40086",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40086"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\n\nAn array of VM binds can potentially evict other buffer objects (BOs)\nwithin the same VM under certain conditions, which may lead to NULL\npointer dereferences later in the bind pipeline. To prevent this, clear\nthe allow_res_evict flag in the xe_bo_validate call.\n\nv2:\n - Invert polarity of no_res_evict (Thomas)\n - Add comment in code explaining issue (Thomas)\n\n(cherry picked from commit 8b9ba8d6d95fe75fed6b0480bb03da4b321bea08)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40086",
          "url": "https://www.suse.com/security/cve/CVE-2025-40086"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252923 for CVE-2025-40086",
          "url": "https://bugzilla.suse.com/1252923"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40086"
    },
    {
      "cve": "CVE-2025-40087",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40087"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Define a proc_layoutcommit for the FlexFiles layout type\n\nAvoid a crash if a pNFS client should happen to send a LAYOUTCOMMIT\noperation on a FlexFiles layout.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40087",
          "url": "https://www.suse.com/security/cve/CVE-2025-40087"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252909 for CVE-2025-40087",
          "url": "https://bugzilla.suse.com/1252909"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40087"
    },
    {
      "cve": "CVE-2025-40088",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40088"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp()\n\nThe hfsplus_strcasecmp() logic can trigger the issue:\n\n[  117.317703][ T9855] ==================================================================\n[  117.318353][ T9855] BUG: KASAN: slab-out-of-bounds in hfsplus_strcasecmp+0x1bc/0x490\n[  117.318991][ T9855] Read of size 2 at addr ffff88802160f40c by task repro/9855\n[  117.319577][ T9855]\n[  117.319773][ T9855] CPU: 0 UID: 0 PID: 9855 Comm: repro Not tainted 6.17.0-rc6 #33 PREEMPT(full)\n[  117.319780][ T9855] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n[  117.319783][ T9855] Call Trace:\n[  117.319785][ T9855]  \u003cTASK\u003e\n[  117.319788][ T9855]  dump_stack_lvl+0x1c1/0x2a0\n[  117.319795][ T9855]  ? __virt_addr_valid+0x1c8/0x5c0\n[  117.319803][ T9855]  ? __pfx_dump_stack_lvl+0x10/0x10\n[  117.319808][ T9855]  ? rcu_is_watching+0x15/0xb0\n[  117.319816][ T9855]  ? lock_release+0x4b/0x3e0\n[  117.319821][ T9855]  ? __kasan_check_byte+0x12/0x40\n[  117.319828][ T9855]  ? __virt_addr_valid+0x1c8/0x5c0\n[  117.319835][ T9855]  ? __virt_addr_valid+0x4a5/0x5c0\n[  117.319842][ T9855]  print_report+0x17e/0x7e0\n[  117.319848][ T9855]  ? __virt_addr_valid+0x1c8/0x5c0\n[  117.319855][ T9855]  ? __virt_addr_valid+0x4a5/0x5c0\n[  117.319862][ T9855]  ? __phys_addr+0xd3/0x180\n[  117.319869][ T9855]  ? hfsplus_strcasecmp+0x1bc/0x490\n[  117.319876][ T9855]  kasan_report+0x147/0x180\n[  117.319882][ T9855]  ? hfsplus_strcasecmp+0x1bc/0x490\n[  117.319891][ T9855]  hfsplus_strcasecmp+0x1bc/0x490\n[  117.319900][ T9855]  ? __pfx_hfsplus_cat_case_cmp_key+0x10/0x10\n[  117.319906][ T9855]  hfs_find_rec_by_key+0xa9/0x1e0\n[  117.319913][ T9855]  __hfsplus_brec_find+0x18e/0x470\n[  117.319920][ T9855]  ? __pfx_hfsplus_bnode_find+0x10/0x10\n[  117.319926][ T9855]  ? __pfx_hfs_find_rec_by_key+0x10/0x10\n[  117.319933][ T9855]  ? __pfx___hfsplus_brec_find+0x10/0x10\n[  117.319942][ T9855]  hfsplus_brec_find+0x28f/0x510\n[  117.319949][ T9855]  ? __pfx_hfs_find_rec_by_key+0x10/0x10\n[  117.319956][ T9855]  ? __pfx_hfsplus_brec_find+0x10/0x10\n[  117.319963][ T9855]  ? __kmalloc_noprof+0x2a9/0x510\n[  117.319969][ T9855]  ? hfsplus_find_init+0x8c/0x1d0\n[  117.319976][ T9855]  hfsplus_brec_read+0x2b/0x120\n[  117.319983][ T9855]  hfsplus_lookup+0x2aa/0x890\n[  117.319990][ T9855]  ? __pfx_hfsplus_lookup+0x10/0x10\n[  117.320003][ T9855]  ? d_alloc_parallel+0x2f0/0x15e0\n[  117.320008][ T9855]  ? __lock_acquire+0xaec/0xd80\n[  117.320013][ T9855]  ? __pfx_d_alloc_parallel+0x10/0x10\n[  117.320019][ T9855]  ? __raw_spin_lock_init+0x45/0x100\n[  117.320026][ T9855]  ? __init_waitqueue_head+0xa9/0x150\n[  117.320034][ T9855]  __lookup_slow+0x297/0x3d0\n[  117.320039][ T9855]  ? __pfx___lookup_slow+0x10/0x10\n[  117.320045][ T9855]  ? down_read+0x1ad/0x2e0\n[  117.320055][ T9855]  lookup_slow+0x53/0x70\n[  117.320065][ T9855]  walk_component+0x2f0/0x430\n[  117.320073][ T9855]  path_lookupat+0x169/0x440\n[  117.320081][ T9855]  filename_lookup+0x212/0x590\n[  117.320089][ T9855]  ? __pfx_filename_lookup+0x10/0x10\n[  117.320098][ T9855]  ? strncpy_from_user+0x150/0x290\n[  117.320105][ T9855]  ? getname_flags+0x1e5/0x540\n[  117.320112][ T9855]  user_path_at+0x3a/0x60\n[  117.320117][ T9855]  __x64_sys_umount+0xee/0x160\n[  117.320123][ T9855]  ? __pfx___x64_sys_umount+0x10/0x10\n[  117.320129][ T9855]  ? do_syscall_64+0xb7/0x3a0\n[  117.320135][ T9855]  ? entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[  117.320141][ T9855]  ? entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[  117.320145][ T9855]  do_syscall_64+0xf3/0x3a0\n[  117.320150][ T9855]  ? exc_page_fault+0x9f/0xf0\n[  117.320154][ T9855]  entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[  117.320158][ T9855] RIP: 0033:0x7f7dd7908b07\n[  117.320163][ T9855] Code: 23 0d 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 08\n[  117.320167][ T9855] RSP: 002b:00007ffd5ebd9698 EFLAGS: 00000202 \n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40088",
          "url": "https://www.suse.com/security/cve/CVE-2025-40088"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252904 for CVE-2025-40088",
          "url": "https://bugzilla.suse.com/1252904"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40088"
    },
    {
      "cve": "CVE-2025-40089",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40089"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncxl/features: Add check for no entries in cxl_feature_info\n\ncxl EDAC calls cxl_feature_info() to get the feature information and\nif the hardware has no Features support, cxlfs may be passed in as\nNULL.\n\n[   51.957498] BUG: kernel NULL pointer dereference, address: 0000000000000008\n[   51.965571] #PF: supervisor read access in kernel mode\n[   51.971559] #PF: error_code(0x0000) - not-present page\n[   51.977542] PGD 17e4f6067 P4D 0\n[   51.981384] Oops: Oops: 0000 [#1] SMP NOPTI\n[   51.986300] CPU: 49 UID: 0 PID: 3782 Comm: systemd-udevd Not tainted 6.17.0dj\ntest+ #64 PREEMPT(voluntary)\n[   51.997355] Hardware name: \u003cremoved\u003e\n[   52.009790] RIP: 0010:cxl_feature_info+0xa/0x80 [cxl_core]\n\nAdd a check for cxlfs before dereferencing it and return -EOPNOTSUPP if\nthere is no cxlfs created due to no hardware support.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40089",
          "url": "https://www.suse.com/security/cve/CVE-2025-40089"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252903 for CVE-2025-40089",
          "url": "https://bugzilla.suse.com/1252903"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40089"
    },
    {
      "cve": "CVE-2025-40090",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40090"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix recursive locking in RPC handle list access\n\nSince commit 305853cce3794 (\"ksmbd: Fix race condition in RPC handle list\naccess\"), ksmbd_session_rpc_method() attempts to lock sess-\u003erpc_lock.\n\nThis causes hung connections / tasks when a client attempts to open\na named pipe. Using Samba\u0027s rpcclient tool:\n\n $ rpcclient //192.168.1.254 -U user%password\n $ rpcclient $\u003e srvinfo\n \u003cconnection hung here\u003e\n\nKernel side:\n  \"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n  task:kworker/0:0 state:D stack:0 pid:5021 tgid:5021 ppid:2 flags:0x00200000\n  Workqueue: ksmbd-io handle_ksmbd_work\n  Call trace:\n  __schedule from schedule+0x3c/0x58\n  schedule from schedule_preempt_disabled+0xc/0x10\n  schedule_preempt_disabled from rwsem_down_read_slowpath+0x1b0/0x1d8\n  rwsem_down_read_slowpath from down_read+0x28/0x30\n  down_read from ksmbd_session_rpc_method+0x18/0x3c\n  ksmbd_session_rpc_method from ksmbd_rpc_open+0x34/0x68\n  ksmbd_rpc_open from ksmbd_session_rpc_open+0x194/0x228\n  ksmbd_session_rpc_open from create_smb2_pipe+0x8c/0x2c8\n  create_smb2_pipe from smb2_open+0x10c/0x27ac\n  smb2_open from handle_ksmbd_work+0x238/0x3dc\n  handle_ksmbd_work from process_scheduled_works+0x160/0x25c\n  process_scheduled_works from worker_thread+0x16c/0x1e8\n  worker_thread from kthread+0xa8/0xb8\n  kthread from ret_from_fork+0x14/0x38\n  Exception stack(0x8529ffb0 to 0x8529fff8)\n\nThe task deadlocks because the lock is already held:\n  ksmbd_session_rpc_open\n    down_write(\u0026sess-\u003erpc_lock)\n    ksmbd_rpc_open\n      ksmbd_session_rpc_method\n        down_read(\u0026sess-\u003erpc_lock)   \u003c-- deadlock\n\nAdjust ksmbd_session_rpc_method() callers to take the lock when necessary.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40090",
          "url": "https://www.suse.com/security/cve/CVE-2025-40090"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252910 for CVE-2025-40090",
          "url": "https://bugzilla.suse.com/1252910"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40090"
    },
    {
      "cve": "CVE-2025-40091",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40091"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nixgbe: fix too early devlink_free() in ixgbe_remove()\n\nSince ixgbe_adapter is embedded in devlink, calling devlink_free()\nprematurely in the ixgbe_remove() path can lead to UAF. Move devlink_free()\nto the end.\n\nKASAN report:\n\n BUG: KASAN: use-after-free in ixgbe_reset_interrupt_capability+0x140/0x180 [ixgbe]\n Read of size 8 at addr ffff0000adf813e0 by task bash/2095\n CPU: 1 UID: 0 PID: 2095 Comm: bash Tainted: G S  6.17.0-rc2-tnguy.net-queue+ #1 PREEMPT(full)\n [...]\n Call trace:\n  show_stack+0x30/0x90 (C)\n  dump_stack_lvl+0x9c/0xd0\n  print_address_description.constprop.0+0x90/0x310\n  print_report+0x104/0x1f0\n  kasan_report+0x88/0x180\n  __asan_report_load8_noabort+0x20/0x30\n  ixgbe_reset_interrupt_capability+0x140/0x180 [ixgbe]\n  ixgbe_clear_interrupt_scheme+0xf8/0x130 [ixgbe]\n  ixgbe_remove+0x2d0/0x8c0 [ixgbe]\n  pci_device_remove+0xa0/0x220\n  device_remove+0xb8/0x170\n  device_release_driver_internal+0x318/0x490\n  device_driver_detach+0x40/0x68\n  unbind_store+0xec/0x118\n  drv_attr_store+0x64/0xb8\n  sysfs_kf_write+0xcc/0x138\n  kernfs_fop_write_iter+0x294/0x440\n  new_sync_write+0x1fc/0x588\n  vfs_write+0x480/0x6a0\n  ksys_write+0xf0/0x1e0\n  __arm64_sys_write+0x70/0xc0\n  invoke_syscall.constprop.0+0xcc/0x280\n  el0_svc_common.constprop.0+0xa8/0x248\n  do_el0_svc+0x44/0x68\n  el0_svc+0x54/0x160\n  el0t_64_sync_handler+0xa0/0xe8\n  el0t_64_sync+0x1b0/0x1b8",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40091",
          "url": "https://www.suse.com/security/cve/CVE-2025-40091"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252915 for CVE-2025-40091",
          "url": "https://bugzilla.suse.com/1252915"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40091"
    },
    {
      "cve": "CVE-2025-40092",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40092"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_ncm: Refactor bind path to use __free()\n\nAfter an bind/unbind cycle, the ncm-\u003enotify_req is left stale. If a\nsubsequent bind fails, the unified error label attempts to free this\nstale request, leading to a NULL pointer dereference when accessing\nep-\u003eops-\u003efree_request.\n\nRefactor the error handling in the bind path to use the __free()\nautomatic cleanup mechanism.\n\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000020\nCall trace:\n usb_ep_free_request+0x2c/0xec\n ncm_bind+0x39c/0x3dc\n usb_add_function+0xcc/0x1f0\n configfs_composite_bind+0x468/0x588\n gadget_bind_driver+0x104/0x270\n really_probe+0x190/0x374\n __driver_probe_device+0xa0/0x12c\n driver_probe_device+0x3c/0x218\n __device_attach_driver+0x14c/0x188\n bus_for_each_drv+0x10c/0x168\n __device_attach+0xfc/0x198\n device_initial_probe+0x14/0x24\n bus_probe_device+0x94/0x11c\n device_add+0x268/0x48c\n usb_add_gadget+0x198/0x28c\n dwc3_gadget_init+0x700/0x858\n __dwc3_set_mode+0x3cc/0x664\n process_scheduled_works+0x1d8/0x488\n worker_thread+0x244/0x334\n kthread+0x114/0x1bc\n ret_from_fork+0x10/0x20",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40092",
          "url": "https://www.suse.com/security/cve/CVE-2025-40092"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252916 for CVE-2025-40092",
          "url": "https://bugzilla.suse.com/1252916"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40092"
    },
    {
      "cve": "CVE-2025-40093",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40093"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_ecm: Refactor bind path to use __free()\n\nAfter an bind/unbind cycle, the ecm-\u003enotify_req is left stale. If a\nsubsequent bind fails, the unified error label attempts to free this\nstale request, leading to a NULL pointer dereference when accessing\nep-\u003eops-\u003efree_request.\n\nRefactor the error handling in the bind path to use the __free()\nautomatic cleanup mechanism.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40093",
          "url": "https://www.suse.com/security/cve/CVE-2025-40093"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252906 for CVE-2025-40093",
          "url": "https://bugzilla.suse.com/1252906"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40093"
    },
    {
      "cve": "CVE-2025-40094",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40094"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_acm: Refactor bind path to use __free()\n\nAfter an bind/unbind cycle, the acm-\u003enotify_req is left stale. If a\nsubsequent bind fails, the unified error label attempts to free this\nstale request, leading to a NULL pointer dereference when accessing\nep-\u003eops-\u003efree_request.\n\nRefactor the error handling in the bind path to use the __free()\nautomatic cleanup mechanism.\n\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000020\nCall trace:\n usb_ep_free_request+0x2c/0xec\n gs_free_req+0x30/0x44\n acm_bind+0x1b8/0x1f4\n usb_add_function+0xcc/0x1f0\n configfs_composite_bind+0x468/0x588\n gadget_bind_driver+0x104/0x270\n really_probe+0x190/0x374\n __driver_probe_device+0xa0/0x12c\n driver_probe_device+0x3c/0x218\n __device_attach_driver+0x14c/0x188\n bus_for_each_drv+0x10c/0x168\n __device_attach+0xfc/0x198\n device_initial_probe+0x14/0x24\n bus_probe_device+0x94/0x11c\n device_add+0x268/0x48c\n usb_add_gadget+0x198/0x28c\n dwc3_gadget_init+0x700/0x858\n __dwc3_set_mode+0x3cc/0x664\n process_scheduled_works+0x1d8/0x488\n worker_thread+0x244/0x334\n kthread+0x114/0x1bc\n ret_from_fork+0x10/0x20",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40094",
          "url": "https://www.suse.com/security/cve/CVE-2025-40094"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252899 for CVE-2025-40094",
          "url": "https://bugzilla.suse.com/1252899"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40094"
    },
    {
      "cve": "CVE-2025-40095",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40095"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_rndis: Refactor bind path to use __free()\n\nAfter an bind/unbind cycle, the rndis-\u003enotify_req is left stale. If a\nsubsequent bind fails, the unified error label attempts to free this\nstale request, leading to a NULL pointer dereference when accessing\nep-\u003eops-\u003efree_request.\n\nRefactor the error handling in the bind path to use the __free()\nautomatic cleanup mechanism.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40095",
          "url": "https://www.suse.com/security/cve/CVE-2025-40095"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252898 for CVE-2025-40095",
          "url": "https://bugzilla.suse.com/1252898"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40095"
    },
    {
      "cve": "CVE-2025-40096",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40096"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies\n\nWhen adding dependencies with drm_sched_job_add_dependency(), that\nfunction consumes the fence reference both on success and failure, so in\nthe latter case the dma_fence_put() on the error path (xarray failed to\nexpand) is a double free.\n\nInterestingly this bug appears to have been present ever since\ncommit ebd5f74255b9 (\"drm/sched: Add dependency tracking\"), since the code\nback then looked like this:\n\ndrm_sched_job_add_implicit_dependencies():\n...\n       for (i = 0; i \u003c fence_count; i++) {\n               ret = drm_sched_job_add_dependency(job, fences[i]);\n               if (ret)\n                       break;\n       }\n\n       for (; i \u003c fence_count; i++)\n               dma_fence_put(fences[i]);\n\nWhich means for the failing \u0027i\u0027 the dma_fence_put was already a double\nfree. Possibly there were no users at that time, or the test cases were\ninsufficient to hit it.\n\nThe bug was then only noticed and fixed after\ncommit 9c2ba265352a (\"drm/scheduler: use new iterator in drm_sched_job_add_implicit_dependencies v2\")\nlanded, with its fixup of\ncommit 4eaf02d6076c (\"drm/scheduler: fix drm_sched_job_add_implicit_dependencies\").\n\nAt that point it was a slightly different flavour of a double free, which\ncommit 963d0b356935 (\"drm/scheduler: fix drm_sched_job_add_implicit_dependencies harder\")\nnoticed and attempted to fix.\n\nBut it only moved the double free from happening inside the\ndrm_sched_job_add_dependency(), when releasing the reference not yet\nobtained, to the caller, when releasing the reference already released by\nthe former in the failure case.\n\nAs such it is not easy to identify the right target for the fixes tag so\nlets keep it simple and just continue the chain.\n\nWhile fixing we also improve the comment and explain the reason for taking\nthe reference and not dropping it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40096",
          "url": "https://www.suse.com/security/cve/CVE-2025-40096"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252902 for CVE-2025-40096",
          "url": "https://bugzilla.suse.com/1252902"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40096"
    },
    {
      "cve": "CVE-2025-40097",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40097"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: Fix missing pointer check in hda_component_manager_init function\n\nThe __component_match_add function may assign the \u0027matchptr\u0027 pointer\nthe value ERR_PTR(-ENOMEM), which will subsequently be dereferenced.\n\nThe call stack leading to the error looks like this:\n\nhda_component_manager_init\n|-\u003e component_match_add\n    |-\u003e component_match_add_release\n        |-\u003e __component_match_add ( ... ,**matchptr, ... )\n            |-\u003e *matchptr = ERR_PTR(-ENOMEM);       // assign\n|-\u003e component_master_add_with_match( ...  match)\n    |-\u003e component_match_realloc(match, match-\u003enum); // dereference\n\nAdd IS_ERR() check to prevent the crash.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40097",
          "url": "https://www.suse.com/security/cve/CVE-2025-40097"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252900 for CVE-2025-40097",
          "url": "https://bugzilla.suse.com/1252900"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40097"
    },
    {
      "cve": "CVE-2025-40098",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40098"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced  without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40098",
          "url": "https://www.suse.com/security/cve/CVE-2025-40098"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252917 for CVE-2025-40098",
          "url": "https://bugzilla.suse.com/1252917"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40098"
    },
    {
      "cve": "CVE-2025-40099",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40099"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: parse_dfs_referrals: prevent oob on malformed input\n\nMalicious SMB server can send invalid reply to FSCTL_DFS_GET_REFERRALS\n\n- reply smaller than sizeof(struct get_dfs_referral_rsp)\n- reply with number of referrals smaller than NumberOfReferrals in the\nheader\n\nProcessing of such replies will cause oob.\n\nReturn -EINVAL error on such replies to prevent oob-s.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40099",
          "url": "https://www.suse.com/security/cve/CVE-2025-40099"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252911 for CVE-2025-40099",
          "url": "https://bugzilla.suse.com/1252911"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40099"
    },
    {
      "cve": "CVE-2025-40100",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40100"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: do not assert we found block group item when creating free space tree\n\nCurrently, when building a free space tree at populate_free_space_tree(),\nif we are not using the block group tree feature, we always expect to find\nblock group items (either extent items or a block group item with key type\nBTRFS_BLOCK_GROUP_ITEM_KEY) when we search the extent tree with\nbtrfs_search_slot_for_read(), so we assert that we found an item. However\nthis expectation is wrong since we can have a new block group created in\nthe current transaction which is still empty and for which we still have\nnot added the block group\u0027s item to the extent tree, in which case we do\nnot have any items in the extent tree associated to the block group.\n\nThe insertion of a new block group\u0027s block group item in the extent tree\nhappens at btrfs_create_pending_block_groups() when it calls the helper\ninsert_block_group_item(). This typically is done when a transaction\nhandle is released, committed or when running delayed refs (either as\npart of a transaction commit or when serving tickets for space reservation\nif we are low on free space).\n\nSo remove the assertion at populate_free_space_tree() even when the block\ngroup tree feature is not enabled and update the comment to mention this\ncase.\n\nSyzbot reported this with the following stack trace:\n\n  BTRFS info (device loop3 state M): rebuilding free space tree\n  assertion failed: ret == 0 :: 0, in fs/btrfs/free-space-tree.c:1115\n  ------------[ cut here ]------------\n  kernel BUG at fs/btrfs/free-space-tree.c:1115!\n  Oops: invalid opcode: 0000 [#1] SMP KASAN PTI\n  CPU: 1 UID: 0 PID: 6352 Comm: syz.3.25 Not tainted syzkaller #0 PREEMPT(full)\n  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\n  RIP: 0010:populate_free_space_tree+0x700/0x710 fs/btrfs/free-space-tree.c:1115\n  Code: ff ff e8 d3 (...)\n  RSP: 0018:ffffc9000430f780 EFLAGS: 00010246\n  RAX: 0000000000000043 RBX: ffff88805b709630 RCX: fea61d0e2e79d000\n  RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000\n  RBP: ffffc9000430f8b0 R08: ffffc9000430f4a7 R09: 1ffff92000861e94\n  R10: dffffc0000000000 R11: fffff52000861e95 R12: 0000000000000001\n  R13: 1ffff92000861f00 R14: dffffc0000000000 R15: 0000000000000000\n  FS:  00007f424d9fe6c0(0000) GS:ffff888125afc000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 00007fd78ad212c0 CR3: 0000000076d68000 CR4: 00000000003526f0\n  Call Trace:\n   \u003cTASK\u003e\n   btrfs_rebuild_free_space_tree+0x1ba/0x6d0 fs/btrfs/free-space-tree.c:1364\n   btrfs_start_pre_rw_mount+0x128f/0x1bf0 fs/btrfs/disk-io.c:3062\n   btrfs_remount_rw fs/btrfs/super.c:1334 [inline]\n   btrfs_reconfigure+0xaed/0x2160 fs/btrfs/super.c:1559\n   reconfigure_super+0x227/0x890 fs/super.c:1076\n   do_remount fs/namespace.c:3279 [inline]\n   path_mount+0xd1a/0xfe0 fs/namespace.c:4027\n   do_mount fs/namespace.c:4048 [inline]\n   __do_sys_mount fs/namespace.c:4236 [inline]\n   __se_sys_mount+0x313/0x410 fs/namespace.c:4213\n   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n   do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94\n   entry_SYSCALL_64_after_hwframe+0x77/0x7f\n   RIP: 0033:0x7f424e39066a\n  Code: d8 64 89 02 (...)\n  RSP: 002b:00007f424d9fde68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5\n  RAX: ffffffffffffffda RBX: 00007f424d9fdef0 RCX: 00007f424e39066a\n  RDX: 0000200000000180 RSI: 0000200000000380 RDI: 0000000000000000\n  RBP: 0000200000000180 R08: 00007f424d9fdef0 R09: 0000000000000020\n  R10: 0000000000000020 R11: 0000000000000246 R12: 0000200000000380\n  R13: 00007f424d9fdeb0 R14: 0000000000000000 R15: 00002000000002c0\n   \u003c/TASK\u003e\n  Modules linked in:\n  ---[ end trace 0000000000000000 ]---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40100",
          "url": "https://www.suse.com/security/cve/CVE-2025-40100"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252918 for CVE-2025-40100",
          "url": "https://bugzilla.suse.com/1252918"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40100"
    },
    {
      "cve": "CVE-2025-40101",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40101"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST\n\nAt the end of btrfs_load_block_group_zone_info() the first thing we do\nis to ensure that if the mapping type is not a SINGLE one and there is\nno RAID stripe tree, then we return early with an error.\n\nDoing that, though, prevents the code from running the last calls from\nthis function which are about freeing memory allocated during its\nrun. Hence, in this case, instead of returning early, we set the ret\nvalue and fall through the rest of the cleanup code.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40101",
          "url": "https://www.suse.com/security/cve/CVE-2025-40101"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252901 for CVE-2025-40101",
          "url": "https://bugzilla.suse.com/1252901"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2025-40101"
    },
    {
      "cve": "CVE-2025-40102",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40102"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: Prevent access to vCPU events before init\n\nAnother day, another syzkaller bug. KVM erroneously allows userspace to\npend vCPU events for a vCPU that hasn\u0027t been initialized yet, leading to\nKVM interpreting a bunch of uninitialized garbage for routing /\ninjecting the exception.\n\nIn one case the injection code and the hyp disagree on whether the vCPU\nhas a 32bit EL1 and put the vCPU into an illegal mode for AArch64,\ntripping the BUG() in exception_target_el() during the next injection:\n\n  kernel BUG at arch/arm64/kvm/inject_fault.c:40!\n  Internal error: Oops - BUG: 00000000f2000800 [#1]  SMP\n  CPU: 3 UID: 0 PID: 318 Comm: repro Not tainted 6.17.0-rc4-00104-g10fd0285305d #6 PREEMPT\n  Hardware name: linux,dummy-virt (DT)\n  pstate: 21402009 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n  pc : exception_target_el+0x88/0x8c\n  lr : pend_serror_exception+0x18/0x13c\n  sp : ffff800082f03a10\n  x29: ffff800082f03a10 x28: ffff0000cb132280 x27: 0000000000000000\n  x26: 0000000000000000 x25: ffff0000c2a99c20 x24: 0000000000000000\n  x23: 0000000000008000 x22: 0000000000000002 x21: 0000000000000004\n  x20: 0000000000008000 x19: ffff0000c2a99c20 x18: 0000000000000000\n  x17: 0000000000000000 x16: 0000000000000000 x15: 00000000200000c0\n  x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n  x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n  x8 : ffff800082f03af8 x7 : 0000000000000000 x6 : 0000000000000000\n  x5 : ffff800080f621f0 x4 : 0000000000000000 x3 : 0000000000000000\n  x2 : 000000000040009b x1 : 0000000000000003 x0 : ffff0000c2a99c20\n  Call trace:\n   exception_target_el+0x88/0x8c (P)\n   kvm_inject_serror_esr+0x40/0x3b4\n   __kvm_arm_vcpu_set_events+0xf0/0x100\n   kvm_arch_vcpu_ioctl+0x180/0x9d4\n   kvm_vcpu_ioctl+0x60c/0x9f4\n   __arm64_sys_ioctl+0xac/0x104\n   invoke_syscall+0x48/0x110\n   el0_svc_common.constprop.0+0x40/0xe0\n   do_el0_svc+0x1c/0x28\n   el0_svc+0x34/0xf0\n   el0t_64_sync_handler+0xa0/0xe4\n   el0t_64_sync+0x198/0x19c\n  Code: f946bc01 b4fffe61 9101e020 17fffff2 (d4210000)\n\nReject the ioctls outright as no sane VMM would call these before\nKVM_ARM_VCPU_INIT anyway. Even if it did the exception would\u0027ve been\nthrown away by the eventual reset of the vCPU\u0027s state.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40102",
          "url": "https://www.suse.com/security/cve/CVE-2025-40102"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252919 for CVE-2025-40102",
          "url": "https://bugzilla.suse.com/1252919"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 0,
            "baseSeverity": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40102"
    },
    {
      "cve": "CVE-2025-40103",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40103"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: Fix refcount leak for cifs_sb_tlink\n\nFix three refcount inconsistency issues related to `cifs_sb_tlink`.\n\nComments for `cifs_sb_tlink` state that `cifs_put_tlink()` needs to be\ncalled after successful calls to `cifs_sb_tlink()`. Three calls fail to\nupdate refcount accordingly, leading to possible resource leaks.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40103",
          "url": "https://www.suse.com/security/cve/CVE-2025-40103"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252924 for CVE-2025-40103",
          "url": "https://bugzilla.suse.com/1252924"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2025-40103"
    },
    {
      "cve": "CVE-2025-40104",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40104"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nixgbevf: fix mailbox API compatibility by negotiating supported features\n\nThere was backward compatibility in the terms of mailbox API. Various\ndrivers from various OSes supporting 10G adapters from Intel portfolio\ncould easily negotiate mailbox API.\n\nThis convention has been broken since introducing API 1.4.\nCommit 0062e7cc955e (\"ixgbevf: add VF IPsec offload code\") added support\nfor IPSec which is specific only for the kernel ixgbe driver. None of the\nrest of the Intel 10G PF/VF drivers supports it. And actually lack of\nsupport was not included in the IPSec implementation - there were no such\ncode paths. No possibility to negotiate support for the feature was\nintroduced along with introduction of the feature itself.\n\nCommit 339f28964147 (\"ixgbevf: Add support for new mailbox communication\nbetween PF and VF\") increasing API version to 1.5 did the same - it\nintroduced code supported specifically by the PF ESX driver. It altered API\nversion for the VF driver in the same time not touching the version\ndefined for the PF ixgbe driver. It led to additional discrepancies,\nas the code provided within API 1.6 cannot be supported for Linux ixgbe\ndriver as it causes crashes.\n\nThe issue was noticed some time ago and mitigated by Jake within the commit\nd0725312adf5 (\"ixgbevf: stop attempting IPSEC offload on Mailbox API 1.5\").\nAs a result we have regression for IPsec support and after increasing API\nto version 1.6 ixgbevf driver stopped to support ESX MBX.\n\nTo fix this mess add new mailbox op asking PF driver about supported\nfeatures. Basing on a response determine whether to set support for IPSec\nand ESX-specific enhanced mailbox.\n\nNew mailbox op, for compatibility purposes, must be added within new API\nrevision, as API version of OOT PF \u0026 VF drivers is already increased to\n1.6 and doesn\u0027t incorporate features negotiate op.\n\nFeatures negotiation mechanism gives possibility to be extended with new\nfeatures when needed in the future.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40104",
          "url": "https://www.suse.com/security/cve/CVE-2025-40104"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252921 for CVE-2025-40104",
          "url": "https://bugzilla.suse.com/1252921"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 0,
            "baseSeverity": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40104"
    },
    {
      "cve": "CVE-2025-40105",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40105"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40105",
          "url": "https://www.suse.com/security/cve/CVE-2025-40105"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252928 for CVE-2025-40105",
          "url": "https://bugzilla.suse.com/1252928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2025-40105"
    },
    {
      "cve": "CVE-2025-40106",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40106"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: fix divide-by-zero in comedi_buf_munge()\n\nThe comedi_buf_munge() function performs a modulo operation\n`async-\u003emunge_chan %= async-\u003ecmd.chanlist_len` without first\nchecking if chanlist_len is zero. If a user program submits a command with\nchanlist_len set to zero, this causes a divide-by-zero error when the device\nprocesses data in the interrupt handler path.\n\nAdd a check for zero chanlist_len at the beginning of the\nfunction, similar to the existing checks for !map and\nCMDF_RAWDATA flag. When chanlist_len is zero, update\nmunge_count and return early, indicating the data was\nhandled without munging.\n\nThis prevents potential kernel panics from malformed user commands.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40106",
          "url": "https://www.suse.com/security/cve/CVE-2025-40106"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252891 for CVE-2025-40106",
          "url": "https://bugzilla.suse.com/1252891"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40106"
    },
    {
      "cve": "CVE-2025-40300",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40300"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/vmscape: Add conditional IBPB mitigation\n\nVMSCAPE is a vulnerability that exploits insufficient branch predictor\nisolation between a guest and a userspace hypervisor (like QEMU). Existing\nmitigations already protect kernel/KVM from a malicious guest. Userspace\ncan additionally be protected by flushing the branch predictors after a\nVMexit.\n\nSince it is the userspace that consumes the poisoned branch predictors,\nconditionally issue an IBPB after a VMexit and before returning to\nuserspace. Workloads that frequently switch between hypervisor and\nuserspace will incur the most overhead from the new IBPB.\n\nThis new IBPB is not integrated with the existing IBPB sites. For\ninstance, a task can use the existing speculation control prctl() to\nget an IBPB at context switch time. With this implementation, the\nIBPB is doubled up: one at context switch and another before running\nuserspace.\n\nThe intent is to integrate and optimize these cases post-embargo.\n\n[ dhansen: elaborate on suboptimal IBPB solution ]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40300",
          "url": "https://www.suse.com/security/cve/CVE-2025-40300"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1249561 for CVE-2025-40300",
          "url": "https://bugzilla.suse.com/1249561"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40300"
    },
    {
      "cve": "CVE-2025-68254",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68254"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: rtl8723bs: fix out-of-bounds read in OnBeacon ESR IE parsing\n\nThe Extended Supported Rates (ESR) IE handling in OnBeacon accessed\n*(p + 1 + ielen) and *(p + 2 + ielen) without verifying that these\noffsets lie within the received frame buffer. A malformed beacon with\nan ESR IE positioned at the end of the buffer could cause an\nout-of-bounds read, potentially triggering a kernel panic.\n\nAdd a boundary check to ensure that the ESR IE body and the subsequent\nbytes are within the limits of the frame before attempting to access\nthem.\n\nThis prevents OOB reads caused by malformed beacon frames.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68254",
          "url": "https://www.suse.com/security/cve/CVE-2025-68254"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255140 for CVE-2025-68254",
          "url": "https://bugzilla.suse.com/1255140"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68254"
    },
    {
      "cve": "CVE-2025-68255",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68255"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: rtl8723bs: fix stack buffer overflow in OnAssocReq IE parsing\n\nThe Supported Rates IE length from an incoming Association Request frame\nwas used directly as the memcpy() length when copying into a fixed-size\n16-byte stack buffer (supportRate). A malicious station can advertise an\nIE length larger than 16 bytes, causing a stack buffer overflow.\n\nClamp ie_len to the buffer size before copying the Supported Rates IE,\nand correct the bounds check when merging Extended Supported Rates to\nprevent a second potential overflow.\n\nThis prevents kernel stack corruption triggered by malformed association\nrequests.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68255",
          "url": "https://www.suse.com/security/cve/CVE-2025-68255"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255395 for CVE-2025-68255",
          "url": "https://bugzilla.suse.com/1255395"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68255"
    },
    {
      "cve": "CVE-2025-68256",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68256"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: rtl8723bs: fix out-of-bounds read in rtw_get_ie() parser\n\nThe Information Element (IE) parser rtw_get_ie() trusted the length\nbyte of each IE without validating that the IE body (len bytes after\nthe 2-byte header) fits inside the remaining frame buffer. A malformed\nframe can advertise an IE length larger than the available data, causing\nthe parser to increment its pointer beyond the buffer end. This results\nin out-of-bounds reads or, depending on the pattern, an infinite loop.\n\nFix by validating that (offset + 2 + len) does not exceed the limit\nbefore accepting the IE or advancing to the next element.\n\nThis prevents OOB reads and ensures the parser terminates safely on\nmalformed frames.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68256",
          "url": "https://www.suse.com/security/cve/CVE-2025-68256"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255138 for CVE-2025-68256",
          "url": "https://bugzilla.suse.com/1255138"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68256"
    },
    {
      "cve": "CVE-2025-68257",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68257"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: check device\u0027s attached status in compat ioctls\n\nSyzbot identified an issue [1] that crashes kernel, seemingly due to\nunexistent callback dev-\u003eget_valid_routes(). By all means, this should\nnot occur as said callback must always be set to\nget_zero_valid_routes() in __comedi_device_postconfig().\n\nAs the crash seems to appear exclusively in i386 kernels, at least,\njudging from [1] reports, the blame lies with compat versions\nof standard IOCTL handlers. Several of them are modified and\ndo not use comedi_unlocked_ioctl(). While functionality of these\nioctls essentially copy their original versions, they do not\nhave required sanity check for device\u0027s attached status. This,\nin turn, leads to a possibility of calling select IOCTLs on a\ndevice that has not been properly setup, even via COMEDI_DEVCONFIG.\n\nDoing so on unconfigured devices means that several crucial steps\nare missed, for instance, specifying dev-\u003eget_valid_routes()\ncallback.\n\nFix this somewhat crudely by ensuring device\u0027s attached status before\nperforming any ioctls, improving logic consistency between modern\nand compat functions.\n\n[1] Syzbot report:\nBUG: kernel NULL pointer dereference, address: 0000000000000000\n...\nCR2: ffffffffffffffd6 CR3: 000000006c717000 CR4: 0000000000352ef0\nCall Trace:\n \u003cTASK\u003e\n get_valid_routes drivers/comedi/comedi_fops.c:1322 [inline]\n parse_insn+0x78c/0x1970 drivers/comedi/comedi_fops.c:1401\n do_insnlist_ioctl+0x272/0x700 drivers/comedi/comedi_fops.c:1594\n compat_insnlist drivers/comedi/comedi_fops.c:3208 [inline]\n comedi_compat_ioctl+0x810/0x990 drivers/comedi/comedi_fops.c:3273\n __do_compat_sys_ioctl fs/ioctl.c:695 [inline]\n __se_compat_sys_ioctl fs/ioctl.c:638 [inline]\n __ia32_compat_sys_ioctl+0x242/0x370 fs/ioctl.c:638\n do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline]\n...",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68257",
          "url": "https://www.suse.com/security/cve/CVE-2025-68257"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255167 for CVE-2025-68257",
          "url": "https://bugzilla.suse.com/1255167"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68257"
    },
    {
      "cve": "CVE-2025-68258",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68258"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: multiq3: sanitize config options in multiq3_attach()\n\nSyzbot identified an issue [1] in multiq3_attach() that induces a\ntask timeout due to open() or COMEDI_DEVCONFIG ioctl operations,\nspecifically, in the case of multiq3 driver.\n\nThis problem arose when syzkaller managed to craft weird configuration\noptions used to specify the number of channels in encoder subdevice.\nIf a particularly great number is passed to s-\u003en_chan in\nmultiq3_attach() via it-\u003eoptions[2], then multiple calls to\nmultiq3_encoder_reset() at the end of driver-specific attach() method\nwill be running for minutes, thus blocking tasks and affected devices\nas well.\n\nWhile this issue is most likely not too dangerous for real-life\ndevices, it still makes sense to sanitize configuration inputs. Enable\na sensible limit on the number of encoder chips (4 chips max, each\nwith 2 channels) to stop this behaviour from manifesting.\n\n[1] Syzbot crash:\nINFO: task syz.2.19:6067 blocked for more than 143 seconds.\n...\nCall Trace:\n \u003cTASK\u003e\n context_switch kernel/sched/core.c:5254 [inline]\n __schedule+0x17c4/0x4d60 kernel/sched/core.c:6862\n __schedule_loop kernel/sched/core.c:6944 [inline]\n schedule+0x165/0x360 kernel/sched/core.c:6959\n schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:7016\n __mutex_lock_common kernel/locking/mutex.c:676 [inline]\n __mutex_lock+0x7e6/0x1350 kernel/locking/mutex.c:760\n comedi_open+0xc0/0x590 drivers/comedi/comedi_fops.c:2868\n chrdev_open+0x4cc/0x5e0 fs/char_dev.c:414\n do_dentry_open+0x953/0x13f0 fs/open.c:965\n vfs_open+0x3b/0x340 fs/open.c:1097\n...",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68258",
          "url": "https://www.suse.com/security/cve/CVE-2025-68258"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255182 for CVE-2025-68258",
          "url": "https://bugzilla.suse.com/1255182"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68258"
    },
    {
      "cve": "CVE-2025-68259",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68259"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Don\u0027t skip unrelated instruction if INT3/INTO is replaced\n\nWhen re-injecting a soft interrupt from an INT3, INT0, or (select) INTn\ninstruction, discard the exception and retry the instruction if the code\nstream is changed (e.g. by a different vCPU) between when the CPU\nexecutes the instruction and when KVM decodes the instruction to get the\nnext RIP.\n\nAs effectively predicted by commit 6ef88d6e36c2 (\"KVM: SVM: Re-inject\nINT3/INTO instead of retrying the instruction\"), failure to verify that\nthe correct INTn instruction was decoded can effectively clobber guest\nstate due to decoding the wrong instruction and thus specifying the\nwrong next RIP.\n\nThe bug most often manifests as \"Oops: int3\" panics on static branch\nchecks in Linux guests.  Enabling or disabling a static branch in Linux\nuses the kernel\u0027s \"text poke\" code patching mechanism.  To modify code\nwhile other CPUs may be executing that code, Linux (temporarily)\nreplaces the first byte of the original instruction with an int3 (opcode\n0xcc), then patches in the new code stream except for the first byte,\nand finally replaces the int3 with the first byte of the new code\nstream.  If a CPU hits the int3, i.e. executes the code while it\u0027s being\nmodified, then the guest kernel must look up the RIP to determine how to\nhandle the #BP, e.g. by emulating the new instruction.  If the RIP is\nincorrect, then this lookup fails and the guest kernel panics.\n\nThe bug reproduces almost instantly by hacking the guest kernel to\nrepeatedly check a static branch[1] while running a drgn script[2] on\nthe host to constantly swap out the memory containing the guest\u0027s TSS.\n\n[1]: https://gist.github.com/osandov/44d17c51c28c0ac998ea0334edf90b5a\n[2]: https://gist.github.com/osandov/10e45e45afa29b11e0c7209247afc00b",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68259",
          "url": "https://www.suse.com/security/cve/CVE-2025-68259"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255199 for CVE-2025-68259",
          "url": "https://bugzilla.suse.com/1255199"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68259"
    },
    {
      "cve": "CVE-2025-68260",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68260"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrust_binder: fix race condition on death_list\n\nRust Binder contains the following unsafe operation:\n\n\t// SAFETY: A `NodeDeath` is never inserted into the death list\n\t// of any node other than its owner, so it is either in this\n\t// death list or in no death list.\n\tunsafe { node_inner.death_list.remove(self) };\n\nThis operation is unsafe because when touching the prev/next pointers of\na list element, we have to ensure that no other thread is also touching\nthem in parallel. If the node is present in the list that `remove` is\ncalled on, then that is fine because we have exclusive access to that\nlist. If the node is not in any list, then it\u0027s also ok. But if it\u0027s\npresent in a different list that may be accessed in parallel, then that\nmay be a data race on the prev/next pointers.\n\nAnd unfortunately that is exactly what is happening here. In\nNode::release, we:\n\n 1. Take the lock.\n 2. Move all items to a local list on the stack.\n 3. Drop the lock.\n 4. Iterate the local list on the stack.\n\nCombined with threads using the unsafe remove method on the original\nlist, this leads to memory corruption of the prev/next pointers. This\nleads to crashes like this one:\n\n\tUnable to handle kernel paging request at virtual address 000bb9841bcac70e\n\tMem abort info:\n\t  ESR = 0x0000000096000044\n\t  EC = 0x25: DABT (current EL), IL = 32 bits\n\t  SET = 0, FnV = 0\n\t  EA = 0, S1PTW = 0\n\t  FSC = 0x04: level 0 translation fault\n\tData abort info:\n\t  ISV = 0, ISS = 0x00000044, ISS2 = 0x00000000\n\t  CM = 0, WnR = 1, TnD = 0, TagAccess = 0\n\t  GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n\t[000bb9841bcac70e] address between user and kernel address ranges\n\tInternal error: Oops: 0000000096000044 [#1] PREEMPT SMP\n\tgoogle-cdd 538c004.gcdd: context saved(CPU:1)\n\titem - log_kevents is disabled\n\tModules linked in: ... rust_binder\n\tCPU: 1 UID: 0 PID: 2092 Comm: kworker/1:178 Tainted: G S      W  OE      6.12.52-android16-5-g98debd5df505-4k #1 f94a6367396c5488d635708e43ee0c888d230b0b\n\tTainted: [S]=CPU_OUT_OF_SPEC, [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n\tHardware name: MUSTANG PVT 1.0 based on LGA (DT)\n\tWorkqueue: events _RNvXs6_NtCsdfZWD8DztAw_6kernel9workqueueINtNtNtB7_4sync3arc3ArcNtNtCs8QPsHWIn21X_16rust_binder_main7process7ProcessEINtB5_15WorkItemPointerKy0_E3runB13_ [rust_binder]\n\tpstate: 23400005 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\n\tpc : _RNvXs3_NtCs8QPsHWIn21X_16rust_binder_main7processNtB5_7ProcessNtNtCsdfZWD8DztAw_6kernel9workqueue8WorkItem3run+0x450/0x11f8 [rust_binder]\n\tlr : _RNvXs3_NtCs8QPsHWIn21X_16rust_binder_main7processNtB5_7ProcessNtNtCsdfZWD8DztAw_6kernel9workqueue8WorkItem3run+0x464/0x11f8 [rust_binder]\n\tsp : ffffffc09b433ac0\n\tx29: ffffffc09b433d30 x28: ffffff8821690000 x27: ffffffd40cbaa448\n\tx26: ffffff8821690000 x25: 00000000ffffffff x24: ffffff88d0376578\n\tx23: 0000000000000001 x22: ffffffc09b433c78 x21: ffffff88e8f9bf40\n\tx20: ffffff88e8f9bf40 x19: ffffff882692b000 x18: ffffffd40f10bf00\n\tx17: 00000000c006287d x16: 00000000c006287d x15: 00000000000003b0\n\tx14: 0000000000000100 x13: 000000201cb79ae0 x12: fffffffffffffff0\n\tx11: 0000000000000000 x10: 0000000000000001 x9 : 0000000000000000\n\tx8 : b80bb9841bcac706 x7 : 0000000000000001 x6 : fffffffebee63f30\n\tx5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000\n\tx2 : 0000000000004c31 x1 : ffffff88216900c0 x0 : ffffff88e8f9bf00\n\tCall trace:\n\t _RNvXs3_NtCs8QPsHWIn21X_16rust_binder_main7processNtB5_7ProcessNtNtCsdfZWD8DztAw_6kernel9workqueue8WorkItem3run+0x450/0x11f8 [rust_binder bbc172b53665bbc815363b22e97e3f7e3fe971fc]\n\t process_scheduled_works+0x1c4/0x45c\n\t worker_thread+0x32c/0x3e8\n\t kthread+0x11c/0x1c8\n\t ret_from_fork+0x10/0x20\n\tCode: 94218d85 b4000155 a94026a8 d10102a0 (f9000509)\n\t---[ end trace 0000000000000000 ]---\n\nThus, modify Node::release to pop items directly off the original list.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68260",
          "url": "https://www.suse.com/security/cve/CVE-2025-68260"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255177 for CVE-2025-68260",
          "url": "https://bugzilla.suse.com/1255177"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68260"
    },
    {
      "cve": "CVE-2025-68261",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68261"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: add i_data_sem protection in ext4_destroy_inline_data_nolock()\n\nFix a race between inline data destruction and block mapping.\n\nThe function ext4_destroy_inline_data_nolock() changes the inode data\nlayout by clearing EXT4_INODE_INLINE_DATA and setting EXT4_INODE_EXTENTS.\nAt the same time, another thread may execute ext4_map_blocks(), which\ntests EXT4_INODE_EXTENTS to decide whether to call ext4_ext_map_blocks()\nor ext4_ind_map_blocks().\n\nWithout i_data_sem protection, ext4_ind_map_blocks() may receive inode\nwith EXT4_INODE_EXTENTS flag and triggering assert.\n\nkernel BUG at fs/ext4/indirect.c:546!\nEXT4-fs (loop2): unmounting filesystem.\ninvalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:ext4_ind_map_blocks.cold+0x2b/0x5a fs/ext4/indirect.c:546\n\nCall Trace:\n \u003cTASK\u003e\n ext4_map_blocks+0xb9b/0x16f0 fs/ext4/inode.c:681\n _ext4_get_block+0x242/0x590 fs/ext4/inode.c:822\n ext4_block_write_begin+0x48b/0x12c0 fs/ext4/inode.c:1124\n ext4_write_begin+0x598/0xef0 fs/ext4/inode.c:1255\n ext4_da_write_begin+0x21e/0x9c0 fs/ext4/inode.c:3000\n generic_perform_write+0x259/0x5d0 mm/filemap.c:3846\n ext4_buffered_write_iter+0x15b/0x470 fs/ext4/file.c:285\n ext4_file_write_iter+0x8e0/0x17f0 fs/ext4/file.c:679\n call_write_iter include/linux/fs.h:2271 [inline]\n do_iter_readv_writev+0x212/0x3c0 fs/read_write.c:735\n do_iter_write+0x186/0x710 fs/read_write.c:861\n vfs_iter_write+0x70/0xa0 fs/read_write.c:902\n iter_file_splice_write+0x73b/0xc90 fs/splice.c:685\n do_splice_from fs/splice.c:763 [inline]\n direct_splice_actor+0x10f/0x170 fs/splice.c:950\n splice_direct_to_actor+0x33a/0xa10 fs/splice.c:896\n do_splice_direct+0x1a9/0x280 fs/splice.c:1002\n do_sendfile+0xb13/0x12c0 fs/read_write.c:1255\n __do_sys_sendfile64 fs/read_write.c:1323 [inline]\n __se_sys_sendfile64 fs/read_write.c:1309 [inline]\n __x64_sys_sendfile64+0x1cf/0x210 fs/read_write.c:1309\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68261",
          "url": "https://www.suse.com/security/cve/CVE-2025-68261"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255164 for CVE-2025-68261",
          "url": "https://bugzilla.suse.com/1255164"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68261"
    },
    {
      "cve": "CVE-2025-68262",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68262"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: zstd - fix double-free in per-CPU stream cleanup\n\nThe crypto/zstd module has a double-free bug that occurs when multiple\ntfms are allocated and freed.\n\nThe issue happens because zstd_streams (per-CPU contexts) are freed in\nzstd_exit() during every tfm destruction, rather than being managed at\nthe module level.  When multiple tfms exist, each tfm exit attempts to\nfree the same shared per-CPU streams, resulting in a double-free.\n\nThis leads to a stack trace similar to:\n\n  BUG: Bad page state in process kworker/u16:1  pfn:106fd93\n  page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106fd93\n  flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff)\n  page_type: 0xffffffff()\n  raw: 0017ffffc0000000 dead000000000100 dead000000000122 0000000000000000\n  raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000\n  page dumped because: nonzero entire_mapcount\n  Modules linked in: ...\n  CPU: 3 UID: 0 PID: 2506 Comm: kworker/u16:1 Kdump: loaded Tainted: G    B\n  Hardware name: ...\n  Workqueue: btrfs-delalloc btrfs_work_helper\n  Call Trace:\n   \u003cTASK\u003e\n   dump_stack_lvl+0x5d/0x80\n   bad_page+0x71/0xd0\n   free_unref_page_prepare+0x24e/0x490\n   free_unref_page+0x60/0x170\n   crypto_acomp_free_streams+0x5d/0xc0\n   crypto_acomp_exit_tfm+0x23/0x50\n   crypto_destroy_tfm+0x60/0xc0\n   ...\n\nChange the lifecycle management of zstd_streams to free the streams only\nonce during module cleanup.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68262",
          "url": "https://www.suse.com/security/cve/CVE-2025-68262"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255158 for CVE-2025-68262",
          "url": "https://bugzilla.suse.com/1255158"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68262"
    },
    {
      "cve": "CVE-2025-68263",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68263"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: ipc: fix use-after-free in ipc_msg_send_request\n\nipc_msg_send_request() waits for a generic netlink reply using an\nipc_msg_table_entry on the stack. The generic netlink handler\n(handle_generic_event()/handle_response()) fills entry-\u003eresponse under\nipc_msg_table_lock, but ipc_msg_send_request() used to validate and free\nentry-\u003eresponse without holding the same lock.\n\nUnder high concurrency this allows a race where handle_response() is\ncopying data into entry-\u003eresponse while ipc_msg_send_request() has just\nfreed it, leading to a slab-use-after-free reported by KASAN in\nhandle_generic_event():\n\n  BUG: KASAN: slab-use-after-free in handle_generic_event+0x3c4/0x5f0 [ksmbd]\n  Write of size 12 at addr ffff888198ee6e20 by task pool/109349\n  ...\n  Freed by task:\n    kvfree\n    ipc_msg_send_request [ksmbd]\n    ksmbd_rpc_open -\u003e ksmbd_session_rpc_open [ksmbd]\n\nFix by:\n- Taking ipc_msg_table_lock in ipc_msg_send_request() while validating\n  entry-\u003eresponse, freeing it when invalid, and removing the entry from\n  ipc_msg_table.\n- Returning the final entry-\u003eresponse pointer to the caller only after\n  the hash entry is removed under the lock.\n- Returning NULL in the error path, preserving the original API\n  semantics.\n\nThis makes all accesses to entry-\u003eresponse consistent with\nhandle_response(), which already updates and fills the response buffer\nunder ipc_msg_table_lock, and closes the race that allowed the UAF.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68263",
          "url": "https://www.suse.com/security/cve/CVE-2025-68263"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255384 for CVE-2025-68263",
          "url": "https://bugzilla.suse.com/1255384"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68263"
    },
    {
      "cve": "CVE-2025-68264",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68264"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: refresh inline data size before write operations\n\nThe cached ei-\u003ei_inline_size can become stale between the initial size\ncheck and when ext4_update_inline_data()/ext4_create_inline_data() use\nit. Although ext4_get_max_inline_size() reads the correct value at the\ntime of the check, concurrent xattr operations can modify i_inline_size\nbefore ext4_write_lock_xattr() is acquired.\n\nThis causes ext4_update_inline_data() and ext4_create_inline_data() to\nwork with stale capacity values, leading to a BUG_ON() crash in\next4_write_inline_data():\n\n  kernel BUG at fs/ext4/inline.c:1331!\n  BUG_ON(pos + len \u003e EXT4_I(inode)-\u003ei_inline_size);\n\nThe race window:\n1. ext4_get_max_inline_size() reads i_inline_size = 60 (correct)\n2. Size check passes for 50-byte write\n3. [Another thread adds xattr, i_inline_size changes to 40]\n4. ext4_write_lock_xattr() acquires lock\n5. ext4_update_inline_data() uses stale i_inline_size = 60\n6. Attempts to write 50 bytes but only 40 bytes actually available\n7. BUG_ON() triggers\n\nFix this by recalculating i_inline_size via ext4_find_inline_data_nolock()\nimmediately after acquiring xattr_sem. This ensures ext4_update_inline_data()\nand ext4_create_inline_data() work with current values that are protected\nfrom concurrent modifications.\n\nThis is similar to commit a54c4613dac1 (\"ext4: fix race writing to an\ninline_data file while its xattrs are changing\") which fixed i_inline_off\nstaleness. This patch addresses the related i_inline_size staleness issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68264",
          "url": "https://www.suse.com/security/cve/CVE-2025-68264"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255380 for CVE-2025-68264",
          "url": "https://bugzilla.suse.com/1255380"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68264"
    },
    {
      "cve": "CVE-2025-68323",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68323"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: ucsi: fix use-after-free caused by uec-\u003ework\n\nThe delayed work uec-\u003ework is scheduled in gaokun_ucsi_probe()\nbut never properly canceled in gaokun_ucsi_remove(). This creates\nuse-after-free scenarios where the ucsi and gaokun_ucsi structure\nare freed after ucsi_destroy() completes execution, while the\ngaokun_ucsi_register_worker() might be either currently executing\nor still pending in the work queue. The already-freed gaokun_ucsi\nor ucsi structure may then be accessed.\n\nFurthermore, the race window is 3 seconds, which is sufficiently\nlong to make this bug easily reproducible. The following is the\ntrace captured by KASAN:\n\n==================================================================\nBUG: KASAN: slab-use-after-free in __run_timers+0x5ec/0x630\nWrite of size 8 at addr ffff00000ec28cc8 by task swapper/0/0\n...\nCall trace:\n show_stack+0x18/0x24 (C)\n dump_stack_lvl+0x78/0x90\n print_report+0x114/0x580\n kasan_report+0xa4/0xf0\n __asan_report_store8_noabort+0x20/0x2c\n __run_timers+0x5ec/0x630\n run_timer_softirq+0xe8/0x1cc\n handle_softirqs+0x294/0x720\n __do_softirq+0x14/0x20\n ____do_softirq+0x10/0x1c\n call_on_irq_stack+0x30/0x48\n do_softirq_own_stack+0x1c/0x28\n __irq_exit_rcu+0x27c/0x364\n irq_exit_rcu+0x10/0x1c\n el1_interrupt+0x40/0x60\n el1h_64_irq_handler+0x18/0x24\n el1h_64_irq+0x6c/0x70\n arch_local_irq_enable+0x4/0x8 (P)\n do_idle+0x334/0x458\n cpu_startup_entry+0x60/0x70\n rest_init+0x158/0x174\n start_kernel+0x2f8/0x394\n __primary_switched+0x8c/0x94\n\nAllocated by task 72 on cpu 0 at 27.510341s:\n kasan_save_stack+0x2c/0x54\n kasan_save_track+0x24/0x5c\n kasan_save_alloc_info+0x40/0x54\n __kasan_kmalloc+0xa0/0xb8\n __kmalloc_node_track_caller_noprof+0x1c0/0x588\n devm_kmalloc+0x7c/0x1c8\n gaokun_ucsi_probe+0xa0/0x840  auxiliary_bus_probe+0x94/0xf8\n really_probe+0x17c/0x5b8\n __driver_probe_device+0x158/0x2c4\n driver_probe_device+0x10c/0x264\n __device_attach_driver+0x168/0x2d0\n bus_for_each_drv+0x100/0x188\n __device_attach+0x174/0x368\n device_initial_probe+0x14/0x20\n bus_probe_device+0x120/0x150\n device_add+0xb3c/0x10fc\n __auxiliary_device_add+0x88/0x130\n...\n\nFreed by task 73 on cpu 1 at 28.910627s:\n kasan_save_stack+0x2c/0x54\n kasan_save_track+0x24/0x5c\n __kasan_save_free_info+0x4c/0x74\n __kasan_slab_free+0x60/0x8c\n kfree+0xd4/0x410\n devres_release_all+0x140/0x1f0\n device_unbind_cleanup+0x20/0x190\n device_release_driver_internal+0x344/0x460\n device_release_driver+0x18/0x24\n bus_remove_device+0x198/0x274\n device_del+0x310/0xa84\n...\n\nThe buggy address belongs to the object at ffff00000ec28c00\n which belongs to the cache kmalloc-512 of size 512\nThe buggy address is located 200 bytes inside of\n freed 512-byte region\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x4ec28\nhead: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\nflags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)\npage_type: f5(slab)\nraw: 03fffe0000000040 ffff000008801c80 dead000000000122 0000000000000000\nraw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000\nhead: 03fffe0000000040 ffff000008801c80 dead000000000122 0000000000000000\nhead: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000\nhead: 03fffe0000000002 fffffdffc03b0a01 00000000ffffffff 00000000ffffffff\nhead: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004\npage dumped because: kasan: bad access detected\n\nMemory state around the buggy address:\n ffff00000ec28b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n ffff00000ec28c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n\u003effff00000ec28c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n                                              ^\n ffff00000ec28d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n ffff00000ec28d80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n================================================================\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68323",
          "url": "https://www.suse.com/security/cve/CVE-2025-68323"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255405 for CVE-2025-68323",
          "url": "https://bugzilla.suse.com/1255405"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-68323"
    },
    {
      "cve": "CVE-2025-68324",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68324"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: imm: Fix use-after-free bug caused by unfinished delayed work\n\nThe delayed work item \u0027imm_tq\u0027 is initialized in imm_attach() and\nscheduled via imm_queuecommand() for processing SCSI commands.  When the\nIMM parallel port SCSI host adapter is detached through imm_detach(),\nthe imm_struct device instance is deallocated.\n\nHowever, the delayed work might still be pending or executing\nwhen imm_detach() is called, leading to use-after-free bugs\nwhen the work function imm_interrupt() accesses the already\nfreed imm_struct memory.\n\nThe race condition can occur as follows:\n\nCPU 0(detach thread)   | CPU 1\n                       | imm_queuecommand()\n                       |   imm_queuecommand_lck()\nimm_detach()           |     schedule_delayed_work()\n  kfree(dev) //FREE    | imm_interrupt()\n                       |   dev = container_of(...) //USE\n                           dev-\u003e //USE\n\nAdd disable_delayed_work_sync() in imm_detach() to guarantee proper\ncancellation of the delayed work item before imm_struct is deallocated.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68324",
          "url": "https://www.suse.com/security/cve/CVE-2025-68324"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255416 for CVE-2025-68324",
          "url": "https://bugzilla.suse.com/1255416"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1257117 for CVE-2025-68324",
          "url": "https://bugzilla.suse.com/1257117"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-68324"
    },
    {
      "cve": "CVE-2025-68325",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68325"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_cake: Fix incorrect qlen reduction in cake_drop\n\nIn cake_drop(), qdisc_tree_reduce_backlog() is used to update the qlen\nand backlog of the qdisc hierarchy. Its caller, cake_enqueue(), assumes\nthat the parent qdisc will enqueue the current packet. However, this\nassumption breaks when cake_enqueue() returns NET_XMIT_CN: the parent\nqdisc stops enqueuing current packet, leaving the tree qlen/backlog\naccounting inconsistent. This mismatch can lead to a NULL dereference\n(e.g., when the parent Qdisc is qfq_qdisc).\n\nThis patch computes the qlen/backlog delta in a more robust way by\nobserving the difference before and after the series of cake_drop()\ncalls, and then compensates the qdisc tree accounting if cake_enqueue()\nreturns NET_XMIT_CN.\n\nTo ensure correct compensation when ACK thinning is enabled, a new\nvariable is introduced to keep qlen unchanged.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68325",
          "url": "https://www.suse.com/security/cve/CVE-2025-68325"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255417 for CVE-2025-68325",
          "url": "https://bugzilla.suse.com/1255417"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68325"
    },
    {
      "cve": "CVE-2025-68332",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68332"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: c6xdigio: Fix invalid PNP driver unregistration\n\nThe Comedi low-level driver \"c6xdigio\" seems to be for a parallel port\nconnected device.  When the Comedi core calls the driver\u0027s Comedi\n\"attach\" handler `c6xdigio_attach()` to configure a Comedi to use this\ndriver, it tries to enable the parallel port PNP resources by\nregistering a PNP driver with `pnp_register_driver()`, but ignores the\nreturn value.  (The `struct pnp_driver` it uses has only the `name` and\n`id_table` members filled in.)  The driver\u0027s Comedi \"detach\" handler\n`c6xdigio_detach()` unconditionally unregisters the PNP driver with\n`pnp_unregister_driver()`.\n\nIt is possible for `c6xdigio_attach()` to return an error before it\ncalls `pnp_register_driver()` and it is possible for the call to\n`pnp_register_driver()` to return an error (that is ignored).  In both\ncases, the driver should not be calling `pnp_unregister_driver()` as it\ndoes in `c6xdigio_detach()`.  (Note that `c6xdigio_detach()` will be\ncalled by the Comedi core if `c6xdigio_attach()` returns an error, or if\nthe Comedi core decides to detach the Comedi device from the driver for\nsome other reason.)\n\nThe unconditional call to `pnp_unregister_driver()` without a previous\nsuccessful call to `pnp_register_driver()` will cause\n`driver_unregister()` to issue a warning \"Unexpected driver\nunregister!\".  This was detected by Syzbot [1].\n\nAlso, the PNP driver registration and unregistration should be done at\nmodule init and exit time, respectively, not when attaching or detaching\nComedi devices to the driver.  (There might be more than one Comedi\ndevice being attached to the driver, although that is unlikely.)\n\nChange the driver to do the PNP driver registration at module init time,\nand the unregistration at module exit time.  Since `c6xdigio_detach()`\nnow only calls `comedi_legacy_detach()`, remove the function and change\nthe Comedi driver \"detach\" handler to `comedi_legacy_detach`.\n\n-------------------------------------------\n[1] Syzbot sample crash report:\nUnexpected driver unregister!\nWARNING: CPU: 0 PID: 5970 at drivers/base/driver.c:273 driver_unregister drivers/base/driver.c:273 [inline]\nWARNING: CPU: 0 PID: 5970 at drivers/base/driver.c:273 driver_unregister+0x90/0xb0 drivers/base/driver.c:270\nModules linked in:\nCPU: 0 UID: 0 PID: 5970 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025\nRIP: 0010:driver_unregister drivers/base/driver.c:273 [inline]\nRIP: 0010:driver_unregister+0x90/0xb0 drivers/base/driver.c:270\nCode: 48 89 ef e8 c2 e6 82 fc 48 89 df e8 3a 93 ff ff 5b 5d e9 c3 6d d9 fb e8 be 6d d9 fb 90 48 c7 c7 e0 f8 1f 8c e8 51 a2 97 fb 90 \u003c0f\u003e 0b 90 90 5b 5d e9 a5 6d d9 fb e8 e0 f4 41 fc eb 94 e8 d9 f4 41\nRSP: 0018:ffffc9000373f9a0 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: ffffffff8ff24720 RCX: ffffffff817b6ee8\nRDX: ffff88807c932480 RSI: ffffffff817b6ef5 RDI: 0000000000000001\nRBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000001 R11: 0000000000000001 R12: ffffffff8ff24660\nR13: dffffc0000000000 R14: 0000000000000000 R15: ffff88814cca0000\nFS:  000055556dab1500(0000) GS:ffff8881249d9000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000055f77f285cd0 CR3: 000000007d871000 CR4: 00000000003526f0\nCall Trace:\n \u003cTASK\u003e\n comedi_device_detach_locked+0x12f/0xa50 drivers/comedi/drivers.c:207\n comedi_device_detach+0x67/0xb0 drivers/comedi/drivers.c:215\n comedi_device_attach+0x43d/0x900 drivers/comedi/drivers.c:1011\n do_devconfig_ioctl+0x1b1/0x710 drivers/comedi/comedi_fops.c:872\n comedi_unlocked_ioctl+0x165d/0x2f00 drivers/comedi/comedi_fops.c:2178\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:597 [inline]\n __se_sys_ioctl fs/ioctl.c:583 [inline]\n __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:583\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_sys\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68332",
          "url": "https://www.suse.com/security/cve/CVE-2025-68332"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255483 for CVE-2025-68332",
          "url": "https://bugzilla.suse.com/1255483"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68332"
    },
    {
      "cve": "CVE-2025-68335",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68335"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: pcl818: fix null-ptr-deref in pcl818_ai_cancel()\n\nSyzbot identified an issue [1] in pcl818_ai_cancel(), which stems from\nthe fact that in case of early device detach via pcl818_detach(),\nsubdevice dev-\u003eread_subdev may not have initialized its pointer to\n\u0026struct comedi_async as intended. Thus, any such dereferencing of\n\u0026s-\u003easync-\u003ecmd will lead to general protection fault and kernel crash.\n\nMitigate this problem by removing a call to pcl818_ai_cancel() from\npcl818_detach() altogether. This way, if the subdevice setups its\nsupport for async commands, everything async-related will be\nhandled via subdevice\u0027s own -\u003ecancel() function in\ncomedi_device_detach_locked() even before pcl818_detach(). If no\nsupport for asynchronous commands is provided, there is no need\nto cancel anything either.\n\n[1] Syzbot crash:\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000005: 0000 [#1] SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x0000000000000028-0x000000000000002f]\nCPU: 1 UID: 0 PID: 6050 Comm: syz.0.18 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nRIP: 0010:pcl818_ai_cancel+0x69/0x3f0 drivers/comedi/drivers/pcl818.c:762\n...\nCall Trace:\n \u003cTASK\u003e\n pcl818_detach+0x66/0xd0 drivers/comedi/drivers/pcl818.c:1115\n comedi_device_detach_locked+0x178/0x750 drivers/comedi/drivers.c:207\n do_devconfig_ioctl drivers/comedi/comedi_fops.c:848 [inline]\n comedi_unlocked_ioctl+0xcde/0x1020 drivers/comedi/comedi_fops.c:2178\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:597 [inline]\n...",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68335",
          "url": "https://www.suse.com/security/cve/CVE-2025-68335"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255480 for CVE-2025-68335",
          "url": "https://bugzilla.suse.com/1255480"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68335"
    },
    {
      "cve": "CVE-2025-68336",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68336"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlocking/spinlock/debug: Fix data-race in do_raw_write_lock\n\nKCSAN reports:\n\nBUG: KCSAN: data-race in do_raw_write_lock / do_raw_write_lock\n\nwrite (marked) to 0xffff800009cf504c of 4 bytes by task 1102 on cpu 1:\n do_raw_write_lock+0x120/0x204\n _raw_write_lock_irq\n do_exit\n call_usermodehelper_exec_async\n ret_from_fork\n\nread to 0xffff800009cf504c of 4 bytes by task 1103 on cpu 0:\n do_raw_write_lock+0x88/0x204\n _raw_write_lock_irq\n do_exit\n call_usermodehelper_exec_async\n ret_from_fork\n\nvalue changed: 0xffffffff -\u003e 0x00000001\n\nReported by Kernel Concurrency Sanitizer on:\nCPU: 0 PID: 1103 Comm: kworker/u4:1 6.1.111\n\nCommit 1a365e822372 (\"locking/spinlock/debug: Fix various data races\") has\nadressed most of these races, but seems to be not consistent/not complete.\n\n\u003eFrom do_raw_write_lock() only debug_write_lock_after() part has been\nconverted to WRITE_ONCE(), but not debug_write_lock_before() part.\nDo it now.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68336",
          "url": "https://www.suse.com/security/cve/CVE-2025-68336"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255481 for CVE-2025-68336",
          "url": "https://bugzilla.suse.com/1255481"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68336"
    },
    {
      "cve": "CVE-2025-68337",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68337"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\njbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted\n\nThere\u0027s issue when file system corrupted:\n------------[ cut here ]------------\nkernel BUG at fs/jbd2/transaction.c:1289!\nOops: invalid opcode: 0000 [#1] SMP KASAN PTI\nCPU: 5 UID: 0 PID: 2031 Comm: mkdir Not tainted 6.18.0-rc1-next\nRIP: 0010:jbd2_journal_get_create_access+0x3b6/0x4d0\nRSP: 0018:ffff888117aafa30 EFLAGS: 00010202\nRAX: 0000000000000000 RBX: ffff88811a86b000 RCX: ffffffff89a63534\nRDX: 1ffff110200ec602 RSI: 0000000000000004 RDI: ffff888100763010\nRBP: ffff888100763000 R08: 0000000000000001 R09: ffff888100763028\nR10: 0000000000000003 R11: 0000000000000000 R12: 0000000000000000\nR13: ffff88812c432000 R14: ffff88812c608000 R15: ffff888120bfc000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f91d6970c99 CR3: 00000001159c4000 CR4: 00000000000006f0\nCall Trace:\n \u003cTASK\u003e\n __ext4_journal_get_create_access+0x42/0x170\n ext4_getblk+0x319/0x6f0\n ext4_bread+0x11/0x100\n ext4_append+0x1e6/0x4a0\n ext4_init_new_dir+0x145/0x1d0\n ext4_mkdir+0x326/0x920\n vfs_mkdir+0x45c/0x740\n do_mkdirat+0x234/0x2f0\n __x64_sys_mkdir+0xd6/0x120\n do_syscall_64+0x5f/0xfa0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nThe above issue occurs with us in errors=continue mode when accompanied by\nstorage failures. There have been many inconsistencies in the file system\ndata.\nIn the case of file system data inconsistency, for example, if the block\nbitmap of a referenced block is not set, it can lead to the situation where\na block being committed is allocated and used again. As a result, the\nfollowing condition will not be satisfied then trigger BUG_ON. Of course,\nit is entirely possible to construct a problematic image that can trigger\nthis BUG_ON through specific operations. In fact, I have constructed such\nan image and easily reproduced this issue.\nTherefore, J_ASSERT() holds true only under ideal conditions, but it may\nnot necessarily be satisfied in exceptional scenarios. Using J_ASSERT()\ndirectly in abnormal situations would cause the system to crash, which is\nclearly not what we want. So here we directly trigger a JBD abort instead\nof immediately invoking BUG_ON.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68337",
          "url": "https://www.suse.com/security/cve/CVE-2025-68337"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255482 for CVE-2025-68337",
          "url": "https://bugzilla.suse.com/1255482"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68337"
    },
    {
      "cve": "CVE-2025-68344",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68344"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: wavefront: Fix integer overflow in sample size validation\n\nThe wavefront_send_sample() function has an integer overflow issue\nwhen validating sample size. The header-\u003esize field is u32 but gets\ncast to int for comparison with dev-\u003efreemem\n\nFix by using unsigned comparison to avoid integer overflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68344",
          "url": "https://www.suse.com/security/cve/CVE-2025-68344"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255816 for CVE-2025-68344",
          "url": "https://bugzilla.suse.com/1255816"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68344"
    },
    {
      "cve": "CVE-2025-68345",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68345"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_hda_read_acpi()\n\nThe acpi_get_first_physical_node() function can return NULL, in which\ncase the get_device() function also returns NULL, but this value is\nthen dereferenced without checking,so add a check to prevent a crash.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68345",
          "url": "https://www.suse.com/security/cve/CVE-2025-68345"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255601 for CVE-2025-68345",
          "url": "https://bugzilla.suse.com/1255601"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68345"
    },
    {
      "cve": "CVE-2025-68346",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68346"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: dice: fix buffer overflow in detect_stream_formats()\n\nThe function detect_stream_formats() reads the stream_count value directly\nfrom a FireWire device without validating it. This can lead to\nout-of-bounds writes when a malicious device provides a stream_count value\ngreater than MAX_STREAMS.\n\nFix by applying the same validation to both TX and RX stream counts in\ndetect_stream_formats().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68346",
          "url": "https://www.suse.com/security/cve/CVE-2025-68346"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255603 for CVE-2025-68346",
          "url": "https://bugzilla.suse.com/1255603"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68346"
    },
    {
      "cve": "CVE-2025-68347",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68347"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: firewire-motu: fix buffer overflow in hwdep read for DSP events\n\nThe DSP event handling code in hwdep_read() could write more bytes to\nthe user buffer than requested, when a user provides a buffer smaller\nthan the event header size (8 bytes).\n\nFix by using min_t() to clamp the copy size, This ensures we never copy\nmore than the user requested.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68347",
          "url": "https://www.suse.com/security/cve/CVE-2025-68347"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255706 for CVE-2025-68347",
          "url": "https://bugzilla.suse.com/1255706"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68347"
    },
    {
      "cve": "CVE-2025-68348",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68348"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: fix memory leak in __blkdev_issue_zero_pages\n\nMove the fatal signal check before bio_alloc() to prevent a memory\nleak when BLKDEV_ZERO_KILLABLE is set and a fatal signal is pending.\n\nPreviously, the bio was allocated before checking for a fatal signal.\nIf a signal was pending, the code would break out of the loop without\nfreeing or chaining the just-allocated bio, causing a memory leak.\n\nThis matches the pattern already used in __blkdev_issue_write_zeroes()\nwhere the signal check precedes the allocation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68348",
          "url": "https://www.suse.com/security/cve/CVE-2025-68348"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255694 for CVE-2025-68348",
          "url": "https://bugzilla.suse.com/1255694"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68348"
    },
    {
      "cve": "CVE-2025-68349",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68349"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid\n\nFixes a crash when layout is null during this call stack:\n\nwrite_inode\n    -\u003e nfs4_write_inode\n        -\u003e pnfs_layoutcommit_inode\n\npnfs_set_layoutcommit relies on the lseg refcount to keep the layout\naround. Need to clear NFS_INO_LAYOUTCOMMIT otherwise we might attempt\nto reference a null layout.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68349",
          "url": "https://www.suse.com/security/cve/CVE-2025-68349"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255544 for CVE-2025-68349",
          "url": "https://bugzilla.suse.com/1255544"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68349"
    },
    {
      "cve": "CVE-2025-68350",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68350"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nexfat: fix divide-by-zero in exfat_allocate_bitmap\n\nThe variable max_ra_count can be 0 in exfat_allocate_bitmap(),\nwhich causes a divide-by-zero error in the subsequent modulo operation\n(i % max_ra_count), leading to a system crash.\nWhen max_ra_count is 0, it means that readahead is not used. This patch\nload the bitmap without readahead.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68350",
          "url": "https://www.suse.com/security/cve/CVE-2025-68350"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255625 for CVE-2025-68350",
          "url": "https://bugzilla.suse.com/1255625"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68350"
    },
    {
      "cve": "CVE-2025-68351",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68351"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nexfat: fix refcount leak in exfat_find\n\nFix refcount leaks in `exfat_find` related to `exfat_get_dentry_set`.\n\nFunction `exfat_get_dentry_set` would increase the reference counter of\n`es-\u003ebh` on success. Therefore, `exfat_put_dentry_set` must be called\nafter `exfat_get_dentry_set` to ensure refcount consistency. This patch\nrelocate two checks to avoid possible leaks.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68351",
          "url": "https://www.suse.com/security/cve/CVE-2025-68351"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255567 for CVE-2025-68351",
          "url": "https://bugzilla.suse.com/1255567"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68351"
    },
    {
      "cve": "CVE-2025-68352",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68352"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: ch341: fix out-of-bounds memory access in ch341_transfer_one\n\nDiscovered by Atuin - Automated Vulnerability Discovery Engine.\n\nThe \u0027len\u0027 variable is calculated as \u0027min(32, trans-\u003elen + 1)\u0027,\nwhich includes the 1-byte command header.\n\nWhen copying data from \u0027trans-\u003etx_buf\u0027 to \u0027ch341-\u003etx_buf + 1\u0027, using \u0027len\u0027\nas the length is incorrect because:\n\n1. It causes an out-of-bounds read from \u0027trans-\u003etx_buf\u0027 (which has size\n   \u0027trans-\u003elen\u0027, i.e., \u0027len - 1\u0027 in this context).\n2. It can cause an out-of-bounds write to \u0027ch341-\u003etx_buf\u0027 if \u0027len\u0027 is\n   CH341_PACKET_LENGTH (32). Writing 32 bytes to ch341-\u003etx_buf + 1\n   overflows the buffer.\n\nFix this by copying \u0027len - 1\u0027 bytes.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68352",
          "url": "https://www.suse.com/security/cve/CVE-2025-68352"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255541 for CVE-2025-68352",
          "url": "https://bugzilla.suse.com/1255541"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68352"
    },
    {
      "cve": "CVE-2025-68353",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68353"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: vxlan: prevent NULL deref in vxlan_xmit_one\n\nNeither sock4 nor sock6 pointers are guaranteed to be non-NULL in\nvxlan_xmit_one, e.g. if the iface is brought down. This can lead to the\nfollowing NULL dereference:\n\n  BUG: kernel NULL pointer dereference, address: 0000000000000010\n  Oops: Oops: 0000 [#1] SMP NOPTI\n  RIP: 0010:vxlan_xmit_one+0xbb3/0x1580\n  Call Trace:\n   vxlan_xmit+0x429/0x610\n   dev_hard_start_xmit+0x55/0xa0\n   __dev_queue_xmit+0x6d0/0x7f0\n   ip_finish_output2+0x24b/0x590\n   ip_output+0x63/0x110\n\nMentioned commits changed the code path in vxlan_xmit_one and as a side\neffect the sock4/6 pointer validity checks in vxlan(6)_get_route were\nlost. Fix this by adding back checks.\n\nSince both commits being fixed were released in the same version (v6.7)\nand are strongly related, bundle the fixes in a single commit.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68353",
          "url": "https://www.suse.com/security/cve/CVE-2025-68353"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255533 for CVE-2025-68353",
          "url": "https://bugzilla.suse.com/1255533"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68353"
    },
    {
      "cve": "CVE-2025-68354",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68354"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nregulator: core: Protect regulator_supply_alias_list with regulator_list_mutex\n\nregulator_supply_alias_list was accessed without any locking in\nregulator_supply_alias(), regulator_register_supply_alias(), and\nregulator_unregister_supply_alias(). Concurrent registration,\nunregistration and lookups can race, leading to:\n\n1 use-after-free if an alias entry is removed while being read,\n2 duplicate entries when two threads register the same alias,\n3 inconsistent alias mappings observed by consumers.\n\nProtect all traversals, insertions and deletions on\nregulator_supply_alias_list with the existing regulator_list_mutex.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68354",
          "url": "https://www.suse.com/security/cve/CVE-2025-68354"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255553 for CVE-2025-68354",
          "url": "https://bugzilla.suse.com/1255553"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68354"
    },
    {
      "cve": "CVE-2025-68355",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68355"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix exclusive map memory leak\n\nWhen excl_prog_hash is 0 and excl_prog_hash_size is non-zero, the map also\nneeds to be freed. Otherwise, the map memory will not be reclaimed, just\nlike the memory leak problem reported by syzbot [1].\n\nsyzbot reported:\nBUG: memory leak\n  backtrace (crc 7b9fb9b4):\n    map_create+0x322/0x11e0 kernel/bpf/syscall.c:1512\n    __sys_bpf+0x3556/0x3610 kernel/bpf/syscall.c:6131",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68355",
          "url": "https://www.suse.com/security/cve/CVE-2025-68355"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255599 for CVE-2025-68355",
          "url": "https://bugzilla.suse.com/1255599"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68355"
    },
    {
      "cve": "CVE-2025-68356",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68356"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: Prevent recursive memory reclaim\n\nFunction new_inode() returns a new inode with inode-\u003ei_mapping-\u003egfp_mask\nset to GFP_HIGHUSER_MOVABLE.  This value includes the __GFP_FS flag, so\nallocations in that address space can recurse into filesystem memory\nreclaim.  We don\u0027t want that to happen because it can consume a\nsignificant amount of stack memory.\n\nWorse than that is that it can also deadlock: for example, in several\nplaces, gfs2_unstuff_dinode() is called inside filesystem transactions.\nThis calls filemap_grab_folio(), which can allocate a new folio, which\ncan trigger memory reclaim.  If memory reclaim recurses into the\nfilesystem and starts another transaction, a deadlock will ensue.\n\nTo fix these kinds of problems, prevent memory reclaim from recursing\ninto filesystem code by making sure that the gfp_mask of inode address\nspaces doesn\u0027t include __GFP_FS.\n\nThe \"meta\" and resource group address spaces were already using GFP_NOFS\nas their gfp_mask (which doesn\u0027t include __GFP_FS).  The default value\nof GFP_HIGHUSER_MOVABLE is less restrictive than GFP_NOFS, though.  To\navoid being overly limiting, use the default value and only knock off\nthe __GFP_FS flag.  I\u0027m not sure if this will actually make a\ndifference, but it also shouldn\u0027t hurt.\n\nThis patch is loosely based on commit ad22c7a043c2 (\"xfs: prevent stack\noverflows from page cache allocation\").\n\nFixes xfstest generic/273.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68356",
          "url": "https://www.suse.com/security/cve/CVE-2025-68356"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255593 for CVE-2025-68356",
          "url": "https://bugzilla.suse.com/1255593"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68356"
    },
    {
      "cve": "CVE-2025-68357",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68357"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niomap: allocate s_dio_done_wq for async reads as well\n\nSince commit 222f2c7c6d14 (\"iomap: always run error completions in user\ncontext\"), read error completions are deferred to s_dio_done_wq.  This\nmeans the workqueue also needs to be allocated for async reads.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68357",
          "url": "https://www.suse.com/security/cve/CVE-2025-68357"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255525 for CVE-2025-68357",
          "url": "https://bugzilla.suse.com/1255525"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68357"
    },
    {
      "cve": "CVE-2025-68358",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68358"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix racy bitfield write in btrfs_clear_space_info_full()\n\nFrom the memory-barriers.txt document regarding memory barrier ordering\nguarantees:\n\n (*) These guarantees do not apply to bitfields, because compilers often\n     generate code to modify these using non-atomic read-modify-write\n     sequences.  Do not attempt to use bitfields to synchronize parallel\n     algorithms.\n\n (*) Even in cases where bitfields are protected by locks, all fields\n     in a given bitfield must be protected by one lock.  If two fields\n     in a given bitfield are protected by different locks, the compiler\u0027s\n     non-atomic read-modify-write sequences can cause an update to one\n     field to corrupt the value of an adjacent field.\n\nbtrfs_space_info has a bitfield sharing an underlying word consisting of\nthe fields full, chunk_alloc, and flush:\n\nstruct btrfs_space_info {\n        struct btrfs_fs_info *     fs_info;              /*     0     8 */\n        struct btrfs_space_info *  parent;               /*     8     8 */\n        ...\n        int                        clamp;                /*   172     4 */\n        unsigned int               full:1;               /*   176: 0  4 */\n        unsigned int               chunk_alloc:1;        /*   176: 1  4 */\n        unsigned int               flush:1;              /*   176: 2  4 */\n        ...\n\nTherefore, to be safe from parallel read-modify-writes losing a write to\none of the bitfield members protected by a lock, all writes to all the\nbitfields must use the lock. They almost universally do, except for\nbtrfs_clear_space_info_full() which iterates over the space_infos and\nwrites out found-\u003efull = 0 without a lock.\n\nImagine that we have one thread completing a transaction in which we\nfinished deleting a block_group and are thus calling\nbtrfs_clear_space_info_full() while simultaneously the data reclaim\nticket infrastructure is running do_async_reclaim_data_space():\n\n          T1                                             T2\nbtrfs_commit_transaction\n  btrfs_clear_space_info_full\n  data_sinfo-\u003efull = 0\n  READ: full:0, chunk_alloc:0, flush:1\n                                              do_async_reclaim_data_space(data_sinfo)\n                                              spin_lock(\u0026space_info-\u003elock);\n                                              if(list_empty(tickets))\n                                                space_info-\u003eflush = 0;\n                                                READ: full: 0, chunk_alloc:0, flush:1\n                                                MOD/WRITE: full: 0, chunk_alloc:0, flush:0\n                                                spin_unlock(\u0026space_info-\u003elock);\n                                                return;\n  MOD/WRITE: full:0, chunk_alloc:0, flush:1\n\nand now data_sinfo-\u003eflush is 1 but the reclaim worker has exited. This\nbreaks the invariant that flush is 0 iff there is no work queued or\nrunning. Once this invariant is violated, future allocations that go\ninto __reserve_bytes() will add tickets to space_info-\u003etickets but will\nsee space_info-\u003eflush is set to 1 and not queue the work. After this,\nthey will block forever on the resulting ticket, as it is now impossible\nto kick the worker again.\n\nI also confirmed by looking at the assembly of the affected kernel that\nit is doing RMW operations. For example, to set the flush (3rd) bit to 0,\nthe assembly is:\n  andb    $0xfb,0x60(%rbx)\nand similarly for setting the full (1st) bit to 0:\n  andb    $0xfe,-0x20(%rax)\n\nSo I think this is really a bug on practical systems.  I have observed\na number of systems in this exact state, but am currently unable to\nreproduce it.\n\nRather than leaving this footgun lying around for the future, take\nadvantage of the fact that there is room in the struct anyway, and that\nit is already quite large and simply change the three bitfield members to\nbools. This avoids writes to space_info-\u003efull having any effect on\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68358",
          "url": "https://www.suse.com/security/cve/CVE-2025-68358"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255531 for CVE-2025-68358",
          "url": "https://bugzilla.suse.com/1255531"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68358"
    },
    {
      "cve": "CVE-2025-68359",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68359"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix double free of qgroup record after failure to add delayed ref head\n\nIn the previous code it was possible to incur into a double kfree()\nscenario when calling add_delayed_ref_head(). This could happen if the\nrecord was reported to already exist in the\nbtrfs_qgroup_trace_extent_nolock() call, but then there was an error\nlater on add_delayed_ref_head(). In this case, since\nadd_delayed_ref_head() returned an error, the caller went to free the\nrecord. Since add_delayed_ref_head() couldn\u0027t set this kfree\u0027d pointer\nto NULL, then kfree() would have acted on a non-NULL \u0027record\u0027 object\nwhich was pointing to memory already freed by the callee.\n\nThe problem comes from the fact that the responsibility to kfree the\nobject is on both the caller and the callee at the same time. Hence, the\nfix for this is to shift the ownership of the \u0027qrecord\u0027 object out of\nthe add_delayed_ref_head(). That is, we will never attempt to kfree()\nthe given object inside of this function, and will expect the caller to\nact on the \u0027qrecord\u0027 object on its own. The only exception where the\n\u0027qrecord\u0027 object cannot be kfree\u0027d is if it was inserted into the\ntracing logic, for which we already have the \u0027qrecord_inserted_ret\u0027\nboolean to account for this. Hence, the caller has to kfree the object\nonly if add_delayed_ref_head() reports not to have inserted it on the\ntracing logic.\n\nAs a side-effect of the above, we must guarantee that\n\u0027qrecord_inserted_ret\u0027 is properly initialized at the start of the\nfunction, not at the end, and then set when an actual insert\nhappens. This way we avoid \u0027qrecord_inserted_ret\u0027 having an invalid\nvalue on an early exit.\n\nThe documentation from the add_delayed_ref_head() has also been updated\nto reflect on the exact ownership of the \u0027qrecord\u0027 object.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68359",
          "url": "https://www.suse.com/security/cve/CVE-2025-68359"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255542 for CVE-2025-68359",
          "url": "https://bugzilla.suse.com/1255542"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68359"
    },
    {
      "cve": "CVE-2025-68360",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68360"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mt76: wed: use proper wed reference in mt76 wed driver callabacks\n\nMT7996 driver can use both wed and wed_hif2 devices to offload traffic\nfrom/to the wireless NIC. In the current codebase we assume to always\nuse the primary wed device in wed callbacks resulting in the following\ncrash if the hw runs wed_hif2 (e.g. 6GHz link).\n\n[  297.455876] Unable to handle kernel read from unreadable memory at virtual address 000000000000080a\n[  297.464928] Mem abort info:\n[  297.467722]   ESR = 0x0000000096000005\n[  297.471461]   EC = 0x25: DABT (current EL), IL = 32 bits\n[  297.476766]   SET = 0, FnV = 0\n[  297.479809]   EA = 0, S1PTW = 0\n[  297.482940]   FSC = 0x05: level 1 translation fault\n[  297.487809] Data abort info:\n[  297.490679]   ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000\n[  297.496156]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n[  297.501196]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n[  297.506500] user pgtable: 4k pages, 39-bit VAs, pgdp=0000000107480000\n[  297.512927] [000000000000080a] pgd=08000001097fb003, p4d=08000001097fb003, pud=08000001097fb003, pmd=0000000000000000\n[  297.523532] Internal error: Oops: 0000000096000005 [#1] SMP\n[  297.715393] CPU: 2 UID: 0 PID: 45 Comm: kworker/u16:2 Tainted: G           O       6.12.50 #0\n[  297.723908] Tainted: [O]=OOT_MODULE\n[  297.727384] Hardware name: Banana Pi BPI-R4 (2x SFP+) (DT)\n[  297.732857] Workqueue: nf_ft_offload_del nf_flow_rule_route_ipv6 [nf_flow_table]\n[  297.740254] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[  297.747205] pc : mt76_wed_offload_disable+0x64/0xa0 [mt76]\n[  297.752688] lr : mtk_wed_flow_remove+0x58/0x80\n[  297.757126] sp : ffffffc080fe3ae0\n[  297.760430] x29: ffffffc080fe3ae0 x28: ffffffc080fe3be0 x27: 00000000deadbef7\n[  297.767557] x26: ffffff80c5ebca00 x25: 0000000000000001 x24: ffffff80c85f4c00\n[  297.774683] x23: ffffff80c1875b78 x22: ffffffc080d42cd0 x21: ffffffc080660018\n[  297.781809] x20: ffffff80c6a076d0 x19: ffffff80c6a043c8 x18: 0000000000000000\n[  297.788935] x17: 0000000000000000 x16: 0000000000000001 x15: 0000000000000000\n[  297.796060] x14: 0000000000000019 x13: ffffff80c0ad8ec0 x12: 00000000fa83b2da\n[  297.803185] x11: ffffff80c02700c0 x10: ffffff80c0ad8ec0 x9 : ffffff81fef96200\n[  297.810311] x8 : ffffff80c02700c0 x7 : ffffff80c02700d0 x6 : 0000000000000002\n[  297.817435] x5 : 0000000000000400 x4 : 0000000000000000 x3 : 0000000000000000\n[  297.824561] x2 : 0000000000000001 x1 : 0000000000000800 x0 : ffffff80c6a063c8\n[  297.831686] Call trace:\n[  297.834123]  mt76_wed_offload_disable+0x64/0xa0 [mt76]\n[  297.839254]  mtk_wed_flow_remove+0x58/0x80\n[  297.843342]  mtk_flow_offload_cmd+0x434/0x574\n[  297.847689]  mtk_wed_setup_tc_block_cb+0x30/0x40\n[  297.852295]  nf_flow_offload_ipv6_hook+0x7f4/0x964 [nf_flow_table]\n[  297.858466]  nf_flow_rule_route_ipv6+0x438/0x4a4 [nf_flow_table]\n[  297.864463]  process_one_work+0x174/0x300\n[  297.868465]  worker_thread+0x278/0x430\n[  297.872204]  kthread+0xd8/0xdc\n[  297.875251]  ret_from_fork+0x10/0x20\n[  297.878820] Code: 928b5ae0 8b000273 91400a60 f943fa61 (79401421)\n[  297.884901] ---[ end trace 0000000000000000 ]---\n\nFix the issue detecting the proper wed reference to use running wed\ncallabacks.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68360",
          "url": "https://www.suse.com/security/cve/CVE-2025-68360"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255536 for CVE-2025-68360",
          "url": "https://bugzilla.suse.com/1255536"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68360"
    },
    {
      "cve": "CVE-2025-68361",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68361"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nerofs: limit the level of fs stacking for file-backed mounts\n\nOtherwise, it could cause potential kernel stack overflow (e.g., EROFS\nmounting itself).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68361",
          "url": "https://www.suse.com/security/cve/CVE-2025-68361"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255526 for CVE-2025-68361",
          "url": "https://bugzilla.suse.com/1255526"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68361"
    },
    {
      "cve": "CVE-2025-68362",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68362"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtl818x: rtl8187: Fix potential buffer underflow in rtl8187_rx_cb()\n\nThe rtl8187_rx_cb() calculates the rx descriptor header address\nby subtracting its size from the skb tail pointer.\nHowever, it does not validate if the received packet\n(skb-\u003elen from urb-\u003eactual_length) is large enough to contain this\nheader.\n\nIf a truncated packet is received, this will lead to a buffer\nunderflow, reading memory before the start of the skb data area,\nand causing a kernel panic.\n\nAdd length checks for both rtl8187 and rtl8187b descriptor headers\nbefore attempting to access them, dropping the packet cleanly if the\ncheck fails.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68362",
          "url": "https://www.suse.com/security/cve/CVE-2025-68362"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255611 for CVE-2025-68362",
          "url": "https://bugzilla.suse.com/1255611"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68362"
    },
    {
      "cve": "CVE-2025-68363",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68363"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Check skb-\u003etransport_header is set in bpf_skb_check_mtu\n\nThe bpf_skb_check_mtu helper needs to use skb-\u003etransport_header when\nthe BPF_MTU_CHK_SEGS flag is used:\n\n\tbpf_skb_check_mtu(skb, ifindex, \u0026mtu_len, 0, BPF_MTU_CHK_SEGS)\n\nThe transport_header is not always set. There is a WARN_ON_ONCE\nreport when CONFIG_DEBUG_NET is enabled + skb-\u003egso_size is set +\nbpf_prog_test_run is used:\n\nWARNING: CPU: 1 PID: 2216 at ./include/linux/skbuff.h:3071\n skb_gso_validate_network_len\n bpf_skb_check_mtu\n bpf_prog_3920e25740a41171_tc_chk_segs_flag # A test in the next patch\n bpf_test_run\n bpf_prog_test_run_skb\n\nFor a normal ingress skb (not test_run), skb_reset_transport_header\nis performed but there is plan to avoid setting it as described in\ncommit 2170a1f09148 (\"net: no longer reset transport_header in __netif_receive_skb_core()\").\n\nThis patch fixes the bpf helper by checking\nskb_transport_header_was_set(). The check is done just before\nskb-\u003etransport_header is used, to avoid breaking the existing bpf prog.\nThe WARN_ON_ONCE is limited to bpf_prog_test_run, so targeting bpf-next.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68363",
          "url": "https://www.suse.com/security/cve/CVE-2025-68363"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255552 for CVE-2025-68363",
          "url": "https://bugzilla.suse.com/1255552"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68363"
    },
    {
      "cve": "CVE-2025-68364",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68364"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: relax BUG() to ocfs2_error() in __ocfs2_move_extent()\n\nIn \u0027__ocfs2_move_extent()\u0027, relax \u0027BUG()\u0027 to \u0027ocfs2_error()\u0027 just\nto avoid crashing the whole kernel due to a filesystem corruption.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68364",
          "url": "https://www.suse.com/security/cve/CVE-2025-68364"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255556 for CVE-2025-68364",
          "url": "https://bugzilla.suse.com/1255556"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68364"
    },
    {
      "cve": "CVE-2025-68365",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68365"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Initialize allocated memory before use\n\nKMSAN reports: Multiple uninitialized values detected:\n\n- KMSAN: uninit-value in ntfs_read_hdr (3)\n- KMSAN: uninit-value in bcmp (3)\n\nMemory is allocated by __getname(), which is a wrapper for\nkmem_cache_alloc(). This memory is used before being properly\ncleared. Change kmem_cache_alloc() to kmem_cache_zalloc() to\nproperly allocate and clear memory before use.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68365",
          "url": "https://www.suse.com/security/cve/CVE-2025-68365"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255548 for CVE-2025-68365",
          "url": "https://bugzilla.suse.com/1255548"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68365"
    },
    {
      "cve": "CVE-2025-68366",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68366"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: defer config unlock in nbd_genl_connect\n\nThere is one use-after-free warning when running NBD_CMD_CONNECT and\nNBD_CLEAR_SOCK:\n\nnbd_genl_connect\n  nbd_alloc_and_init_config // config_refs=1\n  nbd_start_device // config_refs=2\n  set NBD_RT_HAS_CONFIG_REF\t\t\topen nbd // config_refs=3\n  recv_work done // config_refs=2\n\t\t\t\t\t\tNBD_CLEAR_SOCK // config_refs=1\n\t\t\t\t\t\tclose nbd // config_refs=0\n  refcount_inc -\u003e uaf\n\n------------[ cut here ]------------\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 24 PID: 1014 at lib/refcount.c:25 refcount_warn_saturate+0x12e/0x290\n nbd_genl_connect+0x16d0/0x1ab0\n genl_family_rcv_msg_doit+0x1f3/0x310\n genl_rcv_msg+0x44a/0x790\n\nThe issue can be easily reproduced by adding a small delay before\nrefcount_inc(\u0026nbd-\u003econfig_refs) in nbd_genl_connect():\n\n        mutex_unlock(\u0026nbd-\u003econfig_lock);\n        if (!ret) {\n                set_bit(NBD_RT_HAS_CONFIG_REF, \u0026config-\u003eruntime_flags);\n+               printk(\"before sleep\\n\");\n+               mdelay(5 * 1000);\n+               printk(\"after sleep\\n\");\n                refcount_inc(\u0026nbd-\u003econfig_refs);\n                nbd_connect_reply(info, nbd-\u003eindex);\n        }",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68366",
          "url": "https://www.suse.com/security/cve/CVE-2025-68366"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255622 for CVE-2025-68366",
          "url": "https://bugzilla.suse.com/1255622"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68366"
    },
    {
      "cve": "CVE-2025-68367",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68367"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmacintosh/mac_hid: fix race condition in mac_hid_toggle_emumouse\n\nThe following warning appears when running syzkaller, and this issue also\nexists in the mainline code.\n\n ------------[ cut here ]------------\n list_add double add: new=ffffffffa57eee28, prev=ffffffffa57eee28, next=ffffffffa5e63100.\n WARNING: CPU: 0 PID: 1491 at lib/list_debug.c:35 __list_add_valid_or_report+0xf7/0x130\n Modules linked in:\n CPU: 0 PID: 1491 Comm: syz.1.28 Not tainted 6.6.0+ #3\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\n RIP: 0010:__list_add_valid_or_report+0xf7/0x130\n RSP: 0018:ff1100010dfb7b78 EFLAGS: 00010282\n RAX: 0000000000000000 RBX: ffffffffa57eee18 RCX: ffffffff97fc9817\n RDX: 0000000000040000 RSI: ffa0000002383000 RDI: 0000000000000001\n RBP: ffffffffa57eee28 R08: 0000000000000001 R09: ffe21c0021bf6f2c\n R10: 0000000000000001 R11: 6464615f7473696c R12: ffffffffa5e63100\n R13: ffffffffa57eee28 R14: ffffffffa57eee28 R15: ff1100010dfb7d48\n FS:  00007fb14398b640(0000) GS:ff11000119600000(0000) knlGS:0000000000000000\n CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000000 CR3: 000000010d096005 CR4: 0000000000773ef0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n PKRU: 80000000\n Call Trace:\n  \u003cTASK\u003e\n  input_register_handler+0xb3/0x210\n  mac_hid_start_emulation+0x1c5/0x290\n  mac_hid_toggle_emumouse+0x20a/0x240\n  proc_sys_call_handler+0x4c2/0x6e0\n  new_sync_write+0x1b1/0x2d0\n  vfs_write+0x709/0x950\n  ksys_write+0x12a/0x250\n  do_syscall_64+0x5a/0x110\n  entry_SYSCALL_64_after_hwframe+0x78/0xe2\n\nThe WARNING occurs when two processes concurrently write to the mac-hid\nemulation sysctl, causing a race condition in mac_hid_toggle_emumouse().\nBoth processes read old_val=0, then both try to register the input handler,\nleading to a double list_add of the same handler.\n\n  CPU0                             CPU1\n  -------------------------        -------------------------\n  vfs_write() //write 1            vfs_write()  //write 1\n    proc_sys_write()                 proc_sys_write()\n      mac_hid_toggle_emumouse()          mac_hid_toggle_emumouse()\n        old_val = *valp // old_val=0\n                                           old_val = *valp // old_val=0\n                                           mutex_lock_killable()\n                                           proc_dointvec() // *valp=1\n                                           mac_hid_start_emulation()\n                                             input_register_handler()\n                                           mutex_unlock()\n        mutex_lock_killable()\n        proc_dointvec()\n        mac_hid_start_emulation()\n          input_register_handler() //Trigger Warning\n        mutex_unlock()\n\nFix this by moving the old_val read inside the mutex lock region.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68367",
          "url": "https://www.suse.com/security/cve/CVE-2025-68367"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255547 for CVE-2025-68367",
          "url": "https://bugzilla.suse.com/1255547"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68367"
    },
    {
      "cve": "CVE-2025-68368",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68368"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: init bioset in mddev_init\n\nIO operations may be needed before md_run(), such as updating metadata\nafter writing sysfs. Without bioset, this triggers a NULL pointer\ndereference as below:\n\n BUG: kernel NULL pointer dereference, address: 0000000000000020\n Call Trace:\n  md_update_sb+0x658/0xe00\n  new_level_store+0xc5/0x120\n  md_attr_store+0xc9/0x1e0\n  sysfs_kf_write+0x6f/0xa0\n  kernfs_fop_write_iter+0x141/0x2a0\n  vfs_write+0x1fc/0x5a0\n  ksys_write+0x79/0x180\n  __x64_sys_write+0x1d/0x30\n  x64_sys_call+0x2818/0x2880\n  do_syscall_64+0xa9/0x580\n  entry_SYSCALL_64_after_hwframe+0x4b/0x53\n\nReproducer\n```\n  mdadm -CR /dev/md0 -l1 -n2 /dev/sd[cd]\n  echo inactive \u003e /sys/block/md0/md/array_state\n  echo 10 \u003e /sys/block/md0/md/new_level\n```\n\nmddev_init() can only be called once per mddev, no need to test if bioset\nhas been initialized anymore.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68368",
          "url": "https://www.suse.com/security/cve/CVE-2025-68368"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255527 for CVE-2025-68368",
          "url": "https://bugzilla.suse.com/1255527"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68368"
    },
    {
      "cve": "CVE-2025-68369",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68369"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nntfs3: init run lock for extend inode\n\nAfter setting the inode mode of $Extend to a regular file, executing the\ntruncate system call will enter the do_truncate() routine, causing the\nrun_lock uninitialized error reported by syzbot.\n\nPrior to patch 4e8011ffec79, if the inode mode of $Extend was not set to\na regular file, the do_truncate() routine would not be entered.\n\nAdd the run_lock initialization when loading $Extend.\n\nsyzbot reported:\nINFO: trying to register non-static key.\nCall Trace:\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n assign_lock_key+0x133/0x150 kernel/locking/lockdep.c:984\n register_lock_class+0x105/0x320 kernel/locking/lockdep.c:1299\n __lock_acquire+0x99/0xd20 kernel/locking/lockdep.c:5112\n lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5868\n down_write+0x96/0x1f0 kernel/locking/rwsem.c:1590\n ntfs_set_size+0x140/0x200 fs/ntfs3/inode.c:860\n ntfs_extend+0x1d9/0x970 fs/ntfs3/file.c:387\n ntfs_setattr+0x2e8/0xbe0 fs/ntfs3/file.c:808",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68369",
          "url": "https://www.suse.com/security/cve/CVE-2025-68369"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255535 for CVE-2025-68369",
          "url": "https://bugzilla.suse.com/1255535"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68369"
    },
    {
      "cve": "CVE-2025-68370",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68370"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: tmc: add the handle of the event to the path\n\nThe handle is essential for retrieving the AUX_EVENT of each CPU and is\nrequired in perf mode. It has been added to the coresight_path so that\ndependent devices can access it from the path when needed.\n\nThe existing bug can be reproduced with:\nperf record -e cs_etm//k -C 0-9 dd if=/dev/zero of=/dev/null\n\nShowing an oops as follows:\nUnable to handle kernel paging request at virtual address 000f6e84934ed19e\n\nCall trace:\n tmc_etr_get_buffer+0x30/0x80 [coresight_tmc] (P)\n catu_enable_hw+0xbc/0x3d0 [coresight_catu]\n catu_enable+0x70/0xe0 [coresight_catu]\n coresight_enable_path+0xb0/0x258 [coresight]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68370",
          "url": "https://www.suse.com/security/cve/CVE-2025-68370"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255534 for CVE-2025-68370",
          "url": "https://bugzilla.suse.com/1255534"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68370"
    },
    {
      "cve": "CVE-2025-68371",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68371"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: smartpqi: Fix device resources accessed after device removal\n\nCorrect possible race conditions during device removal.\n\nPreviously, a scheduled work item to reset a LUN could still execute\nafter the device was removed, leading to use-after-free and other\nresource access issues.\n\nThis race condition occurs because the abort handler may schedule a LUN\nreset concurrently with device removal via sdev_destroy(), leading to\nuse-after-free and improper access to freed resources.\n\n  - Check in the device reset handler if the device is still present in\n    the controller\u0027s SCSI device list before running; if not, the reset\n    is skipped.\n\n  - Cancel any pending TMF work that has not started in sdev_destroy().\n\n  - Ensure device freeing in sdev_destroy() is done while holding the\n    LUN reset mutex to avoid races with ongoing resets.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68371",
          "url": "https://www.suse.com/security/cve/CVE-2025-68371"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255572 for CVE-2025-68371",
          "url": "https://bugzilla.suse.com/1255572"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68371"
    },
    {
      "cve": "CVE-2025-68372",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68372"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: defer config put in recv_work\n\nThere is one uaf issue in recv_work when running NBD_CLEAR_SOCK and\nNBD_CMD_RECONFIGURE:\n  nbd_genl_connect     // conf_ref=2 (connect and recv_work A)\n  nbd_open\t       // conf_ref=3\n  recv_work A done     // conf_ref=2\n  NBD_CLEAR_SOCK       // conf_ref=1\n  nbd_genl_reconfigure // conf_ref=2 (trigger recv_work B)\n  close nbd\t       // conf_ref=1\n  recv_work B\n    config_put         // conf_ref=0\n    atomic_dec(\u0026config-\u003erecv_threads); -\u003e UAF\n\nOr only running NBD_CLEAR_SOCK:\n  nbd_genl_connect   // conf_ref=2\n  nbd_open \t     // conf_ref=3\n  NBD_CLEAR_SOCK     // conf_ref=2\n  close nbd\n    nbd_release\n      config_put     // conf_ref=1\n  recv_work\n    config_put \t     // conf_ref=0\n    atomic_dec(\u0026config-\u003erecv_threads); -\u003e UAF\n\nCommit 87aac3a80af5 (\"nbd: call nbd_config_put() before notifying the\nwaiter\") moved nbd_config_put() to run before waking up the waiter in\nrecv_work, in order to ensure that nbd_start_device_ioctl() would not\nbe woken up while nbd-\u003etask_recv was still uncleared.\n\nHowever, in nbd_start_device_ioctl(), after being woken up it explicitly\ncalls flush_workqueue() to make sure all current works are finished.\nTherefore, there is no need to move the config put ahead of the wakeup.\n\nMove nbd_config_put() to the end of recv_work, so that the reference is\nheld for the whole lifetime of the worker thread. This makes sure the\nconfig cannot be freed while recv_work is still running, even if clear\n+ reconfigure interleave.\n\nIn addition, we don\u0027t need to worry about recv_work dropping the last\nnbd_put (which causes deadlock):\n\npath A (netlink with NBD_CFLAG_DESTROY_ON_DISCONNECT):\n  connect  // nbd_refs=1 (trigger recv_work)\n  open nbd // nbd_refs=2\n  NBD_CLEAR_SOCK\n  close nbd\n    nbd_release\n      nbd_disconnect_and_put\n        flush_workqueue // recv_work done\n      nbd_config_put\n        nbd_put // nbd_refs=1\n      nbd_put // nbd_refs=0\n        queue_work\n\npath B (netlink without NBD_CFLAG_DESTROY_ON_DISCONNECT):\n  connect  // nbd_refs=2 (trigger recv_work)\n  open nbd // nbd_refs=3\n  NBD_CLEAR_SOCK // conf_refs=2\n  close nbd\n    nbd_release\n      nbd_config_put // conf_refs=1\n      nbd_put // nbd_refs=2\n  recv_work done // conf_refs=0, nbd_refs=1\n  rmmod // nbd_refs=0\n\nDepends-on: e2daec488c57 (\"nbd: Fix hungtask when nbd_config_put\")",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68372",
          "url": "https://www.suse.com/security/cve/CVE-2025-68372"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255537 for CVE-2025-68372",
          "url": "https://bugzilla.suse.com/1255537"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68372"
    },
    {
      "cve": "CVE-2025-68373",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68373"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: avoid repeated calls to del_gendisk\n\nThere is a uaf problem which is found by case 23rdev-lifetime:\n\nOops: general protection fault, probably for non-canonical address 0xdead000000000122\nRIP: 0010:bdi_unregister+0x4b/0x170\nCall Trace:\n \u003cTASK\u003e\n __del_gendisk+0x356/0x3e0\n mddev_unlock+0x351/0x360\n rdev_attr_store+0x217/0x280\n kernfs_fop_write_iter+0x14a/0x210\n vfs_write+0x29e/0x550\n ksys_write+0x74/0xf0\n do_syscall_64+0xbb/0x380\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7ff5250a177e\n\nThe sequence is:\n1. rdev remove path gets reconfig_mutex\n2. rdev remove path release reconfig_mutex in mddev_unlock\n3. md stop calls do_md_stop and sets MD_DELETED\n4. rdev remove path calls del_gendisk because MD_DELETED is set\n5. md stop path release reconfig_mutex and calls del_gendisk again\n\nSo there is a race condition we should resolve. This patch adds a\nflag MD_DO_DELETE to avoid the race condition.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68373",
          "url": "https://www.suse.com/security/cve/CVE-2025-68373"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255610 for CVE-2025-68373",
          "url": "https://bugzilla.suse.com/1255610"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68373"
    },
    {
      "cve": "CVE-2025-68374",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68374"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: fix rcu protection in md_wakeup_thread\n\nWe attempted to use RCU to protect the pointer \u0027thread\u0027, but directly\npassed the value when calling md_wakeup_thread(). This means that the\nRCU pointer has been acquired before rcu_read_lock(), which renders\nrcu_read_lock() ineffective and could lead to a use-after-free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68374",
          "url": "https://www.suse.com/security/cve/CVE-2025-68374"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255530 for CVE-2025-68374",
          "url": "https://bugzilla.suse.com/1255530"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68374"
    },
    {
      "cve": "CVE-2025-68375",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68375"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/x86: Fix NULL event access and potential PEBS record loss\n\nWhen intel_pmu_drain_pebs_icl() is called to drain PEBS records, the\nperf_event_overflow() could be called to process the last PEBS record.\n\nWhile perf_event_overflow() could trigger the interrupt throttle and\nstop all events of the group, like what the below call-chain shows.\n\nperf_event_overflow()\n  -\u003e __perf_event_overflow()\n    -\u003e__perf_event_account_interrupt()\n      -\u003e perf_event_throttle_group()\n        -\u003e perf_event_throttle()\n          -\u003e event-\u003epmu-\u003estop()\n            -\u003e x86_pmu_stop()\n\nThe side effect of stopping the events is that all corresponding event\npointers in cpuc-\u003eevents[] array are cleared to NULL.\n\nAssume there are two PEBS events (event a and event b) in a group. When\nintel_pmu_drain_pebs_icl() calls perf_event_overflow() to process the\nlast PEBS record of PEBS event a, interrupt throttle is triggered and\nall pointers of event a and event b are cleared to NULL. Then\nintel_pmu_drain_pebs_icl() tries to process the last PEBS record of\nevent b and encounters NULL pointer access.\n\nTo avoid this issue, move cpuc-\u003eevents[] clearing from x86_pmu_stop()\nto x86_pmu_del(). It\u0027s safe since cpuc-\u003eactive_mask or\ncpuc-\u003epebs_enabled is always checked before access the event pointer\nfrom cpuc-\u003eevents[].",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68375",
          "url": "https://www.suse.com/security/cve/CVE-2025-68375"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255575 for CVE-2025-68375",
          "url": "https://bugzilla.suse.com/1255575"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68375"
    },
    {
      "cve": "CVE-2025-68376",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68376"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: ETR: Fix ETR buffer use-after-free issue\n\nWhen ETR is enabled as CS_MODE_SYSFS, if the buffer size is changed\nand enabled again, currently sysfs_buf will point to the newly\nallocated memory(buf_new) and free the old memory(buf_old). But the\netr_buf that is being used by the ETR remains pointed to buf_old, not\nupdated to buf_new. In this case, it will result in a memory\nuse-after-free issue.\n\nFix this by checking ETR\u0027s mode before updating and releasing buf_old,\nif the mode is CS_MODE_SYSFS, then skip updating and releasing it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68376",
          "url": "https://www.suse.com/security/cve/CVE-2025-68376"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255529 for CVE-2025-68376",
          "url": "https://bugzilla.suse.com/1255529"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68376"
    },
    {
      "cve": "CVE-2025-68377",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68377"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nns: initialize ns_list_node for initial namespaces\n\nMake sure that the list is always initialized for initial namespaces.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68377",
          "url": "https://www.suse.com/security/cve/CVE-2025-68377"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255592 for CVE-2025-68377",
          "url": "https://bugzilla.suse.com/1255592"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68377"
    },
    {
      "cve": "CVE-2025-68378",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68378"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix stackmap overflow check in __bpf_get_stackid()\n\nSyzkaller reported a KASAN slab-out-of-bounds write in __bpf_get_stackid()\nwhen copying stack trace data. The issue occurs when the perf trace\n contains more stack entries than the stack map bucket can hold,\n leading to an out-of-bounds write in the bucket\u0027s data array.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68378",
          "url": "https://www.suse.com/security/cve/CVE-2025-68378"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255614 for CVE-2025-68378",
          "url": "https://bugzilla.suse.com/1255614"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68378"
    },
    {
      "cve": "CVE-2025-68379",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68379"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix null deref on srq-\u003erq.queue after resize failure\n\nA NULL pointer dereference can occur in rxe_srq_chk_attr() when\nibv_modify_srq() is invoked twice in succession under certain error\nconditions. The first call may fail in rxe_queue_resize(), which leads\nrxe_srq_from_attr() to set srq-\u003erq.queue = NULL. The second call then\ntriggers a crash (null deref) when accessing\nsrq-\u003erq.queue-\u003ebuf-\u003eindex_mask.\n\nCall Trace:\n\u003cTASK\u003e\nrxe_modify_srq+0x170/0x480 [rdma_rxe]\n? __pfx_rxe_modify_srq+0x10/0x10 [rdma_rxe]\n? uverbs_try_lock_object+0x4f/0xa0 [ib_uverbs]\n? rdma_lookup_get_uobject+0x1f0/0x380 [ib_uverbs]\nib_uverbs_modify_srq+0x204/0x290 [ib_uverbs]\n? __pfx_ib_uverbs_modify_srq+0x10/0x10 [ib_uverbs]\n? tryinc_node_nr_active+0xe6/0x150\n? uverbs_fill_udata+0xed/0x4f0 [ib_uverbs]\nib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0x2c0/0x470 [ib_uverbs]\n? __pfx_ib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0x10/0x10 [ib_uverbs]\n? uverbs_fill_udata+0xed/0x4f0 [ib_uverbs]\nib_uverbs_run_method+0x55a/0x6e0 [ib_uverbs]\n? __pfx_ib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0x10/0x10 [ib_uverbs]\nib_uverbs_cmd_verbs+0x54d/0x800 [ib_uverbs]\n? __pfx_ib_uverbs_cmd_verbs+0x10/0x10 [ib_uverbs]\n? __pfx___raw_spin_lock_irqsave+0x10/0x10\n? __pfx_do_vfs_ioctl+0x10/0x10\n? ioctl_has_perm.constprop.0.isra.0+0x2c7/0x4c0\n? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10\nib_uverbs_ioctl+0x13e/0x220 [ib_uverbs]\n? __pfx_ib_uverbs_ioctl+0x10/0x10 [ib_uverbs]\n__x64_sys_ioctl+0x138/0x1c0\ndo_syscall_64+0x82/0x250\n? fdget_pos+0x58/0x4c0\n? ksys_write+0xf3/0x1c0\n? __pfx_ksys_write+0x10/0x10\n? do_syscall_64+0xc8/0x250\n? __pfx_vm_mmap_pgoff+0x10/0x10\n? fget+0x173/0x230\n? fput+0x2a/0x80\n? ksys_mmap_pgoff+0x224/0x4c0\n? do_syscall_64+0xc8/0x250\n? do_user_addr_fault+0x37b/0xfe0\n? clear_bhb_loop+0x50/0xa0\n? clear_bhb_loop+0x50/0xa0\n? clear_bhb_loop+0x50/0xa0\nentry_SYSCALL_64_after_hwframe+0x76/0x7e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68379",
          "url": "https://www.suse.com/security/cve/CVE-2025-68379"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255695 for CVE-2025-68379",
          "url": "https://bugzilla.suse.com/1255695"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68379"
    },
    {
      "cve": "CVE-2025-68380",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68380"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath11k: fix peer HE MCS assignment\n\nIn ath11k_wmi_send_peer_assoc_cmd(), peer\u0027s transmit MCS is sent to\nfirmware as receive MCS while peer\u0027s receive MCS sent as transmit MCS,\nwhich goes against firmwire\u0027s definition.\n\nWhile connecting to a misbehaved AP that advertises 0xffff (meaning not\nsupported) for 160 MHz transmit MCS map, firmware crashes due to 0xffff\nis assigned to he_mcs-\u003erx_mcs_set field.\n\n\tExt Tag: HE Capabilities\n\t    [...]\n\t    Supported HE-MCS and NSS Set\n\t\t[...]\n\t        Rx and Tx MCS Maps 160 MHz\n\t\t    [...]\n\t            Tx HE-MCS Map 160 MHz: 0xffff\n\nSwap the assignment to fix this issue.\n\nAs the HE rate control mask is meant to limit our own transmit MCS, it\nneeds to go via he_mcs-\u003erx_mcs_set field. With the aforementioned swapping\ndone, change is needed as well to apply it to the peer\u0027s receive MCS.\n\nTested-on: WCN6855 hw2.1 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.41\nTested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.4.1-00199-QCAHKSWPL_SILICONZ-1",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68380",
          "url": "https://www.suse.com/security/cve/CVE-2025-68380"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255580 for CVE-2025-68380",
          "url": "https://bugzilla.suse.com/1255580"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68380"
    },
    {
      "cve": "CVE-2025-68724",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68724"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id\n\nUse check_add_overflow() to guard against potential integer overflows\nwhen adding the binary blob lengths and the size of an asymmetric_key_id\nstructure and return ERR_PTR(-EOVERFLOW) accordingly. This prevents a\npossible buffer overflow when copying data from potentially malicious\nX.509 certificate fields that can be arbitrarily large, such as ASN.1\nINTEGER serial numbers, issuer names, etc.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68724",
          "url": "https://www.suse.com/security/cve/CVE-2025-68724"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255550 for CVE-2025-68724",
          "url": "https://bugzilla.suse.com/1255550"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68724"
    },
    {
      "cve": "CVE-2025-68725",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68725"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Do not let BPF test infra emit invalid GSO types to stack\n\nYinhao et al. reported that their fuzzer tool was able to trigger a\nskb_warn_bad_offload() from netif_skb_features() -\u003e gso_features_check().\nWhen a BPF program - triggered via BPF test infra - pushes the packet\nto the loopback device via bpf_clone_redirect() then mentioned offload\nwarning can be seen. GSO-related features are then rightfully disabled.\n\nWe get into this situation due to convert___skb_to_skb() setting\ngso_segs and gso_size but not gso_type. Technically, it makes sense\nthat this warning triggers since the GSO properties are malformed due\nto the gso_type. Potentially, the gso_type could be marked non-trustworthy\nthrough setting it at least to SKB_GSO_DODGY without any other specific\nassumptions, but that also feels wrong given we should not go further\ninto the GSO engine in the first place.\n\nThe checks were added in 121d57af308d (\"gso: validate gso_type in GSO\nhandlers\") because there were malicious (syzbot) senders that combine\na protocol with a non-matching gso_type. If we would want to drop such\npackets, gso_features_check() currently only returns feature flags via\nnetif_skb_features(), so one location for potentially dropping such skbs\ncould be validate_xmit_unreadable_skb(), but then otoh it would be\nan additional check in the fast-path for a very corner case. Given\nbpf_clone_redirect() is the only place where BPF test infra could emit\nsuch packets, lets reject them right there.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68725",
          "url": "https://www.suse.com/security/cve/CVE-2025-68725"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255569 for CVE-2025-68725",
          "url": "https://bugzilla.suse.com/1255569"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68725"
    },
    {
      "cve": "CVE-2025-68726",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68726"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: aead - Fix reqsize handling\n\nCommit afddce13ce81d (\"crypto: api - Add reqsize to crypto_alg\")\nintroduced cra_reqsize field in crypto_alg struct to replace type\nspecific reqsize fields. It looks like this was introduced specifically\nfor ahash and acomp from the commit description as subsequent commits\nadd necessary changes in these alg frameworks.\n\nHowever, this is being recommended for use in all crypto algs\ninstead of setting reqsize using crypto_*_set_reqsize(). Using\ncra_reqsize in aead algorithms, hence, causes memory corruptions and\ncrashes as the underlying functions in the algorithm framework have not\nbeen updated to set the reqsize properly from cra_reqsize. [1]\n\nAdd proper set_reqsize calls in the aead init function to properly\ninitialize reqsize for these algorithms in the framework.\n\n[1]: https://gist.github.com/Pratham-T/24247446f1faf4b7843e4014d5089f6b",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68726",
          "url": "https://www.suse.com/security/cve/CVE-2025-68726"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255598 for CVE-2025-68726",
          "url": "https://bugzilla.suse.com/1255598"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68726"
    },
    {
      "cve": "CVE-2025-68727",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68727"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nntfs3: Fix uninit buffer allocated by __getname()\n\nFix uninit errors caused after buffer allocation given to \u0027de\u0027; by\ninitializing the buffer with zeroes. The fix was found by using KMSAN.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68727",
          "url": "https://www.suse.com/security/cve/CVE-2025-68727"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255568 for CVE-2025-68727",
          "url": "https://bugzilla.suse.com/1255568"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68727"
    },
    {
      "cve": "CVE-2025-68728",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68728"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nntfs3: fix uninit memory after failed mi_read in mi_format_new\n\nFix a KMSAN un-init bug found by syzkaller.\n\nntfs_get_bh() expects a buffer from sb_getblk(), that buffer may not be\nuptodate. We do not bring the buffer uptodate before setting it as\nuptodate. If the buffer were to not be uptodate, it could mean adding a\nbuffer with un-init data to the mi record. Attempting to load that record\nwill trigger KMSAN.\n\nAvoid this by setting the buffer as uptodate, if it\u0027s not already, by\noverwriting it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68728",
          "url": "https://www.suse.com/security/cve/CVE-2025-68728"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255539 for CVE-2025-68728",
          "url": "https://bugzilla.suse.com/1255539"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68728"
    },
    {
      "cve": "CVE-2025-68729",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68729"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath12k: Fix MSDU buffer types handling in RX error path\n\nCurrently, packets received on the REO exception ring from\nunassociated peers are of MSDU buffer type, while the driver expects\nlink descriptor type packets. These packets are not parsed further due\nto a return check on packet type in ath12k_hal_desc_reo_parse_err(),\nbut the associated skb is not freed. This may lead to kernel\ncrashes and buffer leaks.\n\nHence to fix, update the RX error handler to explicitly drop\nMSDU buffer type packets received on the REO exception ring.\nThis prevents further processing of invalid packets and ensures\nstability in the RX error handling path.\n\nTested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.4.1-00199-QCAHKSWPL_SILICONZ-1",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68729",
          "url": "https://www.suse.com/security/cve/CVE-2025-68729"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255692 for CVE-2025-68729",
          "url": "https://bugzilla.suse.com/1255692"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68729"
    },
    {
      "cve": "CVE-2025-68730",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68730"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/ivpu: Fix page fault in ivpu_bo_unbind_all_bos_from_context()\n\nDon\u0027t add BO to the vdev-\u003ebo_list in ivpu_gem_create_object().\nWhen failure happens inside drm_gem_shmem_create(), the BO is not\nfully created and ivpu_gem_bo_free() callback will not be called\ncausing a deleted BO to be left on the list.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68730",
          "url": "https://www.suse.com/security/cve/CVE-2025-68730"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255602 for CVE-2025-68730",
          "url": "https://bugzilla.suse.com/1255602"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68730"
    },
    {
      "cve": "CVE-2025-68731",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68731"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/amdxdna: Fix an integer overflow in aie2_query_ctx_status_array()\n\nThe unpublished smatch static checker reported a warning.\n\ndrivers/accel/amdxdna/aie2_pci.c:904 aie2_query_ctx_status_array()\nwarn: potential user controlled sizeof overflow\n\u0027args-\u003enum_element * args-\u003eelement_size\u0027 \u00271-u32max(user) * 1-u32max(user)\u0027\n\nEven this will not cause a real issue, it is better to put a reasonable\nlimitation for element_size and num_element. Add condition to make sure\nthe input element_size \u003c= 4K and num_element \u003c= 1K.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68731",
          "url": "https://www.suse.com/security/cve/CVE-2025-68731"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255696 for CVE-2025-68731",
          "url": "https://bugzilla.suse.com/1255696"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2025-68731"
    },
    {
      "cve": "CVE-2025-68732",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68732"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpu: host1x: Fix race in syncpt alloc/free\n\nFix race condition between host1x_syncpt_alloc()\nand host1x_syncpt_put() by using kref_put_mutex()\ninstead of kref_put() + manual mutex locking.\n\nThis ensures no thread can acquire the\nsyncpt_mutex after the refcount drops to zero\nbut before syncpt_release acquires it.\nThis prevents races where syncpoints could\nbe allocated while still being cleaned up\nfrom a previous release.\n\nRemove explicit mutex locking in syncpt_release\nas kref_put_mutex() handles this atomically.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68732",
          "url": "https://www.suse.com/security/cve/CVE-2025-68732"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255688 for CVE-2025-68732",
          "url": "https://bugzilla.suse.com/1255688"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255689 for CVE-2025-68732",
          "url": "https://bugzilla.suse.com/1255689"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-68732"
    },
    {
      "cve": "CVE-2025-68733",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68733"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmack: fix bug: unprivileged task can create labels\n\nIf an unprivileged task is allowed to relabel itself\n(/smack/relabel-self is not empty),\nit can freely create new labels by writing their\nnames into own /proc/PID/attr/smack/current\n\nThis occurs because do_setattr() imports\nthe provided label in advance,\nbefore checking \"relabel-self\" list.\n\nThis change ensures that the \"relabel-self\" list\nis checked before importing the label.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68733",
          "url": "https://www.suse.com/security/cve/CVE-2025-68733"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255615 for CVE-2025-68733",
          "url": "https://bugzilla.suse.com/1255615"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68733"
    },
    {
      "cve": "CVE-2025-68735",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68735"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/panthor: Prevent potential UAF in group creation\n\nThis commit prevents the possibility of a use after free issue in the\nGROUP_CREATE ioctl function, which arose as pointer to the group is\naccessed in that ioctl function after storing it in the Xarray.\nA malicious userspace can second guess the handle of a group and try\nto call GROUP_DESTROY ioctl from another thread around the same time\nas GROUP_CREATE ioctl.\n\nTo prevent the use after free exploit, this commit uses a mark on an\nentry of group pool Xarray which is added just before returning from\nthe GROUP_CREATE ioctl function. The mark is checked for all ioctls\nthat specify the group handle and so userspace won\u0027t be abe to delete\na group that isn\u0027t marked yet.\n\nv2: Add R-bs and fixes tags",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68735",
          "url": "https://www.suse.com/security/cve/CVE-2025-68735"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255811 for CVE-2025-68735",
          "url": "https://bugzilla.suse.com/1255811"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256251 for CVE-2025-68735",
          "url": "https://bugzilla.suse.com/1256251"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-68735"
    },
    {
      "cve": "CVE-2025-68736",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68736"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlandlock: Fix handling of disconnected directories\n\nDisconnected files or directories can appear when they are visible and\nopened from a bind mount, but have been renamed or moved from the source\nof the bind mount in a way that makes them inaccessible from the mount\npoint (i.e. out of scope).\n\nPreviously, access rights tied to files or directories opened through a\ndisconnected directory were collected by walking the related hierarchy\ndown to the root of the filesystem, without taking into account the\nmount point because it couldn\u0027t be found. This could lead to\ninconsistent access results, potential access right widening, and\nhard-to-debug renames, especially since such paths cannot be printed.\n\nFor a sandboxed task to create a disconnected directory, it needs to\nhave write access (i.e. FS_MAKE_REG, FS_REMOVE_FILE, and FS_REFER) to\nthe underlying source of the bind mount, and read access to the related\nmount point.   Because a sandboxed task cannot acquire more access\nrights than those defined by its Landlock domain, this could lead to\ninconsistent access rights due to missing permissions that should be\ninherited from the mount point hierarchy, while inheriting permissions\nfrom the filesystem hierarchy hidden by this mount point instead.\n\nLandlock now handles files and directories opened from disconnected\ndirectories by taking into account the filesystem hierarchy when the\nmount point is not found in the hierarchy walk, and also always taking\ninto account the mount point from which these disconnected directories\nwere opened.  This ensures that a rename is not allowed if it would\nwiden access rights [1].\n\nThe rationale is that, even if disconnected hierarchies might not be\nvisible or accessible to a sandboxed task, relying on the collected\naccess rights from them improves the guarantee that access rights will\nnot be widened during a rename because of the access right comparison\nbetween the source and the destination (see LANDLOCK_ACCESS_FS_REFER).\nIt may look like this would grant more access on disconnected files and\ndirectories, but the security policies are always enforced for all the\nevaluated hierarchies.  This new behavior should be less surprising to\nusers and safer from an access control perspective.\n\nRemove a wrong WARN_ON_ONCE() canary in collect_domain_accesses() and\nfix the related comment.\n\nBecause opened files have their access rights stored in the related file\nsecurity properties, there is no impact for disconnected or unlinked\nfiles.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68736",
          "url": "https://www.suse.com/security/cve/CVE-2025-68736"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255698 for CVE-2025-68736",
          "url": "https://bugzilla.suse.com/1255698"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68736"
    },
    {
      "cve": "CVE-2025-68737",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68737"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64/pageattr: Propagate return value from __change_memory_common\n\nThe rodata=on security measure requires that any code path which does\nvmalloc -\u003e set_memory_ro/set_memory_rox must protect the linear map alias\ntoo. Therefore, if such a call fails, we must abort set_memory_* and caller\nmust take appropriate action; currently we are suppressing the error, and\nthere is a real chance of such an error arising post commit a166563e7ec3\n(\"arm64: mm: support large block mapping when rodata=full\"). Therefore,\npropagate any error to the caller.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68737",
          "url": "https://www.suse.com/security/cve/CVE-2025-68737"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255699 for CVE-2025-68737",
          "url": "https://bugzilla.suse.com/1255699"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68737"
    },
    {
      "cve": "CVE-2025-68738",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68738"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mt76: mt7996: fix null pointer deref in mt7996_conf_tx()\n\nIf a link does not have an assigned channel yet, mt7996_vif_link returns\nNULL. We still need to store the updated queue settings in that case, and\napply them later.\nMove the location of the queue params to within struct mt7996_vif_link.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68738",
          "url": "https://www.suse.com/security/cve/CVE-2025-68738"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255700 for CVE-2025-68738",
          "url": "https://bugzilla.suse.com/1255700"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68738"
    },
    {
      "cve": "CVE-2025-68739",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68739"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: hisi: Fix potential UAF in OPP handling\n\nEnsure all required data is acquired before calling dev_pm_opp_put(opp)\nto maintain correct resource acquisition and release order.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68739",
          "url": "https://www.suse.com/security/cve/CVE-2025-68739"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255701 for CVE-2025-68739",
          "url": "https://bugzilla.suse.com/1255701"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68739"
    },
    {
      "cve": "CVE-2025-68740",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68740"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nima: Handle error code returned by ima_filter_rule_match()\n\nIn ima_match_rules(), if ima_filter_rule_match() returns -ENOENT due to\nthe rule being NULL, the function incorrectly skips the \u0027if (!rc)\u0027 check\nand sets \u0027result = true\u0027. The LSM rule is considered a match, causing\nextra files to be measured by IMA.\n\nThis issue can be reproduced in the following scenario:\nAfter unloading the SELinux policy module via \u0027semodule -d\u0027, if an IMA\nmeasurement is triggered before ima_lsm_rules is updated,\nin ima_match_rules(), the first call to ima_filter_rule_match() returns\n-ESTALE. This causes the code to enter the \u0027if (rc == -ESTALE \u0026\u0026\n!rule_reinitialized)\u0027 block, perform ima_lsm_copy_rule() and retry. In\nima_lsm_copy_rule(), since the SELinux module has been removed, the rule\nbecomes NULL, and the second call to ima_filter_rule_match() returns\n-ENOENT. This bypasses the \u0027if (!rc)\u0027 check and results in a false match.\n\nCall trace:\n  selinux_audit_rule_match+0x310/0x3b8\n  security_audit_rule_match+0x60/0xa0\n  ima_match_rules+0x2e4/0x4a0\n  ima_match_policy+0x9c/0x1e8\n  ima_get_action+0x48/0x60\n  process_measurement+0xf8/0xa98\n  ima_bprm_check+0x98/0xd8\n  security_bprm_check+0x5c/0x78\n  search_binary_handler+0x6c/0x318\n  exec_binprm+0x58/0x1b8\n  bprm_execve+0xb8/0x130\n  do_execveat_common.isra.0+0x1a8/0x258\n  __arm64_sys_execve+0x48/0x68\n  invoke_syscall+0x50/0x128\n  el0_svc_common.constprop.0+0xc8/0xf0\n  do_el0_svc+0x24/0x38\n  el0_svc+0x44/0x200\n  el0t_64_sync_handler+0x100/0x130\n  el0t_64_sync+0x3c8/0x3d0\n\nFix this by changing \u0027if (!rc)\u0027 to \u0027if (rc \u003c= 0)\u0027 to ensure that error\ncodes like -ENOENT do not bypass the check and accidentally result in a\nsuccessful match.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68740",
          "url": "https://www.suse.com/security/cve/CVE-2025-68740"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255812 for CVE-2025-68740",
          "url": "https://bugzilla.suse.com/1255812"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68740"
    },
    {
      "cve": "CVE-2025-68741",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68741"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix improper freeing of purex item\n\nIn qla2xxx_process_purls_iocb(), an item is allocated via\nqla27xx_copy_multiple_pkt(), which internally calls\nqla24xx_alloc_purex_item().\n\nThe qla24xx_alloc_purex_item() function may return a pre-allocated item\nfrom a per-adapter pool for small allocations, instead of dynamically\nallocating memory with kzalloc().\n\nAn error handling path in qla2xxx_process_purls_iocb() incorrectly uses\nkfree() to release the item. If the item was from the pre-allocated\npool, calling kfree() on it is a bug that can lead to memory corruption.\n\nFix this by using the correct deallocation function,\nqla24xx_free_purex_item(), which properly handles both dynamically\nallocated and pre-allocated items.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68741",
          "url": "https://www.suse.com/security/cve/CVE-2025-68741"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255703 for CVE-2025-68741",
          "url": "https://bugzilla.suse.com/1255703"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68741"
    },
    {
      "cve": "CVE-2025-68742",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68742"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix invalid prog-\u003estats access when update_effective_progs fails\n\nSyzkaller triggers an invalid memory access issue following fault\ninjection in update_effective_progs. The issue can be described as\nfollows:\n\n__cgroup_bpf_detach\n  update_effective_progs\n    compute_effective_progs\n      bpf_prog_array_alloc \u003c-- fault inject\n  purge_effective_progs\n    /* change to dummy_bpf_prog */\n    array-\u003eitems[index] = \u0026dummy_bpf_prog.prog\n\n---softirq start---\n__do_softirq\n  ...\n    __cgroup_bpf_run_filter_skb\n      __bpf_prog_run_save_cb\n        bpf_prog_run\n          stats = this_cpu_ptr(prog-\u003estats)\n          /* invalid memory access */\n          flags = u64_stats_update_begin_irqsave(\u0026stats-\u003esyncp)\n---softirq end---\n\n  static_branch_dec(\u0026cgroup_bpf_enabled_key[atype])\n\nThe reason is that fault injection caused update_effective_progs to fail\nand then changed the original prog into dummy_bpf_prog.prog in\npurge_effective_progs. Then a softirq came, and accessing the members of\ndummy_bpf_prog.prog in the softirq triggers invalid mem access.\n\nTo fix it, skip updating stats when stats is NULL.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68742",
          "url": "https://www.suse.com/security/cve/CVE-2025-68742"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255707 for CVE-2025-68742",
          "url": "https://bugzilla.suse.com/1255707"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68742"
    },
    {
      "cve": "CVE-2025-68743",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68743"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmshv: Fix create memory region overlap check\n\nThe current check is incorrect; it only checks if the beginning or end\nof a region is within an existing region. This doesn\u0027t account for\nuserspace specifying a region that begins before and ends after an\nexisting region.\n\nChange the logic to a range intersection check against gfns and uaddrs\nfor each region.\n\nRemove mshv_partition_region_by_uaddr() as it is no longer used.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68743",
          "url": "https://www.suse.com/security/cve/CVE-2025-68743"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255708 for CVE-2025-68743",
          "url": "https://bugzilla.suse.com/1255708"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68743"
    },
    {
      "cve": "CVE-2025-68744",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68744"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Free special fields when update [lru_,]percpu_hash maps\n\nAs [lru_,]percpu_hash maps support BPF_KPTR_{REF,PERCPU}, missing\ncalls to \u0027bpf_obj_free_fields()\u0027 in \u0027pcpu_copy_value()\u0027 could cause the\nmemory referenced by BPF_KPTR_{REF,PERCPU} fields to be held until the\nmap gets freed.\n\nFix this by calling \u0027bpf_obj_free_fields()\u0027 after\n\u0027copy_map_value[,_long]()\u0027 in \u0027pcpu_copy_value()\u0027.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68744",
          "url": "https://www.suse.com/security/cve/CVE-2025-68744"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255709 for CVE-2025-68744",
          "url": "https://bugzilla.suse.com/1255709"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68744"
    },
    {
      "cve": "CVE-2025-68745",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68745"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Clear cmds after chip reset\n\nCommit aefed3e5548f (\"scsi: qla2xxx: target: Fix offline port handling\nand host reset handling\") caused two problems:\n\n1. Commands sent to FW, after chip reset got stuck and never freed as FW\n   is not going to respond to them anymore.\n\n2. BUG_ON(cmd-\u003esg_mapped) in qlt_free_cmd().  Commit 26f9ce53817a\n   (\"scsi: qla2xxx: Fix missed DMA unmap for aborted commands\")\n   attempted to fix this, but introduced another bug under different\n   circumstances when two different CPUs were racing to call\n   qlt_unmap_sg() at the same time: BUG_ON(!valid_dma_direction(dir)) in\n   dma_unmap_sg_attrs().\n\nSo revert \"scsi: qla2xxx: Fix missed DMA unmap for aborted commands\" and\npartially revert \"scsi: qla2xxx: target: Fix offline port handling and\nhost reset handling\" at __qla2x00_abort_all_cmds.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68745",
          "url": "https://www.suse.com/security/cve/CVE-2025-68745"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255721 for CVE-2025-68745",
          "url": "https://bugzilla.suse.com/1255721"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68745"
    },
    {
      "cve": "CVE-2025-68746",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68746"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: tegra210-quad: Fix timeout handling\n\nWhen the CPU that the QSPI interrupt handler runs on (typically CPU 0)\nis excessively busy, it can lead to rare cases of the IRQ thread not\nrunning before the transfer timeout is reached.\n\nWhile handling the timeouts, any pending transfers are cleaned up and\nthe message that they correspond to is marked as failed, which leaves\nthe curr_xfer field pointing at stale memory.\n\nTo avoid this, clear curr_xfer to NULL upon timeout and check for this\ncondition when the IRQ thread is finally run.\n\nWhile at it, also make sure to clear interrupts on failure so that new\ninterrupts can be run.\n\nA better, more involved, fix would move the interrupt clearing into a\nhard IRQ handler. Ideally we would also want to signal that the IRQ\nthread no longer needs to be run after the timeout is hit to avoid the\nextra check for a valid transfer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68746",
          "url": "https://www.suse.com/security/cve/CVE-2025-68746"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255722 for CVE-2025-68746",
          "url": "https://bugzilla.suse.com/1255722"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68746"
    },
    {
      "cve": "CVE-2025-68747",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68747"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/panthor: Fix UAF on kernel BO VA nodes\n\nIf the MMU is down, panthor_vm_unmap_range() might return an error.\nWe expect the page table to be updated still, and if the MMU is blocked,\nthe rest of the GPU should be blocked too, so no risk of accessing\nphysical memory returned to the system (which the current code doesn\u0027t\ncover for anyway).\n\nProceed with the rest of the cleanup instead of bailing out and leaving\nthe va_node inserted in the drm_mm, which leads to UAF when other\nadjacent nodes are removed from the drm_mm tree.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68747",
          "url": "https://www.suse.com/security/cve/CVE-2025-68747"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255723 for CVE-2025-68747",
          "url": "https://bugzilla.suse.com/1255723"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1257628 for CVE-2025-68747",
          "url": "https://bugzilla.suse.com/1257628"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-68747"
    },
    {
      "cve": "CVE-2025-68748",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68748"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/panthor: Fix UAF race between device unplug and FW event processing\n\nThe function panthor_fw_unplug() will free the FW memory sections.\nThe problem is that there could still be pending FW events which are yet\nnot handled at this point. process_fw_events_work() can in this case try\nto access said freed memory.\n\nSimply call disable_work_sync() to both drain and prevent future\ninvocation of process_fw_events_work().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68748",
          "url": "https://www.suse.com/security/cve/CVE-2025-68748"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255813 for CVE-2025-68748",
          "url": "https://bugzilla.suse.com/1255813"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68748"
    },
    {
      "cve": "CVE-2025-68749",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68749"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/ivpu: Fix race condition when unbinding BOs\n\nFix \u0027Memory manager not clean during takedown\u0027 warning that occurs\nwhen ivpu_gem_bo_free() removes the BO from the BOs list before it\ngets unmapped. Then file_priv_unbind() triggers a warning in\ndrm_mm_takedown() during context teardown.\n\nProtect the unmapping sequence with bo_list_lock to ensure the BO is\nalways fully unmapped when removed from the list. This ensures the BO\nis either fully unmapped at context teardown time or present on the\nlist and unmapped by file_priv_unbind().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68749",
          "url": "https://www.suse.com/security/cve/CVE-2025-68749"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255724 for CVE-2025-68749",
          "url": "https://bugzilla.suse.com/1255724"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68749"
    },
    {
      "cve": "CVE-2025-68751",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68751"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/fpu: Fix false-positive kmsan report in fpu_vstl()\n\nA false-positive kmsan report is detected when running ping command.\n\nAn inline assembly instruction \u0027vstl\u0027 can write varied amount of bytes\ndepending on value of \u0027index\u0027 argument. If \u0027index\u0027 \u003e 0, \u0027vstl\u0027 writes\nat least 2 bytes.\n\nclang generates kmsan write helper call depending on inline assembly\nconstraints. Constraints are evaluated compile-time, but value of\n\u0027index\u0027 argument is known only at runtime.\n\nclang currently generates call to __msan_instrument_asm_store with 1 byte\nas size. Manually call kmsan function to indicate correct amount of bytes\nwritten and fix false-positive report.\n\nThis change fixes following kmsan reports:\n\n[   36.563119] =====================================================\n[   36.563594] BUG: KMSAN: uninit-value in virtqueue_add+0x35c6/0x7c70\n[   36.563852]  virtqueue_add+0x35c6/0x7c70\n[   36.564016]  virtqueue_add_outbuf+0xa0/0xb0\n[   36.564266]  start_xmit+0x288c/0x4a20\n[   36.564460]  dev_hard_start_xmit+0x302/0x900\n[   36.564649]  sch_direct_xmit+0x340/0xea0\n[   36.564894]  __dev_queue_xmit+0x2e94/0x59b0\n[   36.565058]  neigh_resolve_output+0x936/0xb40\n[   36.565278]  __neigh_update+0x2f66/0x3a60\n[   36.565499]  neigh_update+0x52/0x60\n[   36.565683]  arp_process+0x1588/0x2de0\n[   36.565916]  NF_HOOK+0x1da/0x240\n[   36.566087]  arp_rcv+0x3e4/0x6e0\n[   36.566306]  __netif_receive_skb_list_core+0x1374/0x15a0\n[   36.566527]  netif_receive_skb_list_internal+0x1116/0x17d0\n[   36.566710]  napi_complete_done+0x376/0x740\n[   36.566918]  virtnet_poll+0x1bae/0x2910\n[   36.567130]  __napi_poll+0xf4/0x830\n[   36.567294]  net_rx_action+0x97c/0x1ed0\n[   36.567556]  handle_softirqs+0x306/0xe10\n[   36.567731]  irq_exit_rcu+0x14c/0x2e0\n[   36.567910]  do_io_irq+0xd4/0x120\n[   36.568139]  io_int_handler+0xc2/0xe8\n[   36.568299]  arch_cpu_idle+0xb0/0xc0\n[   36.568540]  arch_cpu_idle+0x76/0xc0\n[   36.568726]  default_idle_call+0x40/0x70\n[   36.568953]  do_idle+0x1d6/0x390\n[   36.569486]  cpu_startup_entry+0x9a/0xb0\n[   36.569745]  rest_init+0x1ea/0x290\n[   36.570029]  start_kernel+0x95e/0xb90\n[   36.570348]  startup_continue+0x2e/0x40\n[   36.570703]\n[   36.570798] Uninit was created at:\n[   36.571002]  kmem_cache_alloc_node_noprof+0x9e8/0x10e0\n[   36.571261]  kmalloc_reserve+0x12a/0x470\n[   36.571553]  __alloc_skb+0x310/0x860\n[   36.571844]  __ip_append_data+0x483e/0x6a30\n[   36.572170]  ip_append_data+0x11c/0x1e0\n[   36.572477]  raw_sendmsg+0x1c8c/0x2180\n[   36.572818]  inet_sendmsg+0xe6/0x190\n[   36.573142]  __sys_sendto+0x55e/0x8e0\n[   36.573392]  __s390x_sys_socketcall+0x19ae/0x2ba0\n[   36.573571]  __do_syscall+0x12e/0x240\n[   36.573823]  system_call+0x6e/0x90\n[   36.573976]\n[   36.574017] Byte 35 of 98 is uninitialized\n[   36.574082] Memory access of size 98 starts at 0000000007aa0012\n[   36.574218]\n[   36.574325] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N  6.17.0-dirty #16 NONE\n[   36.574541] Tainted: [B]=BAD_PAGE, [N]=TEST\n[   36.574617] Hardware name: IBM 3931 A01 703 (KVM/Linux)\n[   36.574755] =====================================================\n\n[   63.532541] =====================================================\n[   63.533639] BUG: KMSAN: uninit-value in virtqueue_add+0x35c6/0x7c70\n[   63.533989]  virtqueue_add+0x35c6/0x7c70\n[   63.534940]  virtqueue_add_outbuf+0xa0/0xb0\n[   63.535861]  start_xmit+0x288c/0x4a20\n[   63.536708]  dev_hard_start_xmit+0x302/0x900\n[   63.537020]  sch_direct_xmit+0x340/0xea0\n[   63.537997]  __dev_queue_xmit+0x2e94/0x59b0\n[   63.538819]  neigh_resolve_output+0x936/0xb40\n[   63.539793]  ip_finish_output2+0x1ee2/0x2200\n[   63.540784]  __ip_finish_output+0x272/0x7a0\n[   63.541765]  ip_finish_output+0x4e/0x5e0\n[   63.542791]  ip_output+0x166/0x410\n[   63.543771]  ip_push_pending_frames+0x1a2/0x470\n[   63.544753]  raw_sendmsg+0x1f06/0x2180\n[   63.545033]  inet_sendmsg+0xe6/0x190\n[   63.546006]  __sys_sendto+0x55e/0x8e0\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68751",
          "url": "https://www.suse.com/security/cve/CVE-2025-68751"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255945 for CVE-2025-68751",
          "url": "https://bugzilla.suse.com/1255945"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2025-68751"
    },
    {
      "cve": "CVE-2025-68752",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68752"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niavf: Implement settime64 with -EOPNOTSUPP\n\nptp_clock_settime() assumes every ptp_clock has implemented settime64().\nStub it with -EOPNOTSUPP to prevent a NULL dereference.\n\nThe fix is similar to commit 329d050bbe63 (\"gve: Implement settime64\nwith -EOPNOTSUPP\").",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68752",
          "url": "https://www.suse.com/security/cve/CVE-2025-68752"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256237 for CVE-2025-68752",
          "url": "https://bugzilla.suse.com/1256237"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/S:U/UI:N/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68752"
    },
    {
      "cve": "CVE-2025-68753",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68753"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: firewire-motu: add bounds check in put_user loop for DSP events\n\nIn the DSP event handling code, a put_user() loop copies event data.\nWhen the user buffer size is not aligned to 4 bytes, it could overwrite\nbeyond the buffer boundary.\n\nFix by adding a bounds check before put_user().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68753",
          "url": "https://www.suse.com/security/cve/CVE-2025-68753"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256238 for CVE-2025-68753",
          "url": "https://bugzilla.suse.com/1256238"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68753"
    },
    {
      "cve": "CVE-2025-68754",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68754"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrtc: amlogic-a4: fix double free caused by devm\n\nThe clock obtained via devm_clk_get_enabled() is automatically managed\nby devres and will be disabled and freed on driver detach. Manually\ncalling clk_disable_unprepare() in error path and remove function\ncauses double free.\n\nRemove the redundant clk_disable_unprepare() calls from the probe\nerror path and aml_rtc_remove(), allowing the devm framework to\nautomatically manage the clock lifecycle.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68754",
          "url": "https://www.suse.com/security/cve/CVE-2025-68754"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256240 for CVE-2025-68754",
          "url": "https://bugzilla.suse.com/1256240"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68754"
    },
    {
      "cve": "CVE-2025-68755",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68755"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: most: remove broken i2c driver\n\nThe MOST I2C driver has been completely broken for five years without\nanyone noticing so remove the driver from staging.\n\nSpecifically, commit 723de0f9171e (\"staging: most: remove device from\ninterface structure\") started requiring drivers to set the interface\ndevice pointer before registration, but the I2C driver was never updated\nwhich results in a NULL pointer dereference if anyone ever tries to\nprobe it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68755",
          "url": "https://www.suse.com/security/cve/CVE-2025-68755"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255940 for CVE-2025-68755",
          "url": "https://bugzilla.suse.com/1255940"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68755"
    },
    {
      "cve": "CVE-2025-68756",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68756"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: Use RCU in blk_mq_[un]quiesce_tagset() instead of set-\u003etag_list_lock\n\nblk_mq_{add,del}_queue_tag_set() functions add and remove queues from\ntagset, the functions make sure that tagset and queues are marked as\nshared when two or more queues are attached to the same tagset.\nInitially a tagset starts as unshared and when the number of added\nqueues reaches two, blk_mq_add_queue_tag_set() marks it as shared along\nwith all the queues attached to it. When the number of attached queues\ndrops to 1 blk_mq_del_queue_tag_set() need to mark both the tagset and\nthe remaining queues as unshared.\n\nBoth functions need to freeze current queues in tagset before setting on\nunsetting BLK_MQ_F_TAG_QUEUE_SHARED flag. While doing so, both functions\nhold set-\u003etag_list_lock mutex, which makes sense as we do not want\nqueues to be added or deleted in the process. This used to work fine\nuntil commit 98d81f0df70c (\"nvme: use blk_mq_[un]quiesce_tagset\")\nmade the nvme driver quiesce tagset instead of quiscing individual\nqueues. blk_mq_quiesce_tagset() does the job and quiesce the queues in\nset-\u003etag_list while holding set-\u003etag_list_lock also.\n\nThis results in deadlock between two threads with these stacktraces:\n\n  __schedule+0x47c/0xbb0\n  ? timerqueue_add+0x66/0xb0\n  schedule+0x1c/0xa0\n  schedule_preempt_disabled+0xa/0x10\n  __mutex_lock.constprop.0+0x271/0x600\n  blk_mq_quiesce_tagset+0x25/0xc0\n  nvme_dev_disable+0x9c/0x250\n  nvme_timeout+0x1fc/0x520\n  blk_mq_handle_expired+0x5c/0x90\n  bt_iter+0x7e/0x90\n  blk_mq_queue_tag_busy_iter+0x27e/0x550\n  ? __blk_mq_complete_request_remote+0x10/0x10\n  ? __blk_mq_complete_request_remote+0x10/0x10\n  ? __call_rcu_common.constprop.0+0x1c0/0x210\n  blk_mq_timeout_work+0x12d/0x170\n  process_one_work+0x12e/0x2d0\n  worker_thread+0x288/0x3a0\n  ? rescuer_thread+0x480/0x480\n  kthread+0xb8/0xe0\n  ? kthread_park+0x80/0x80\n  ret_from_fork+0x2d/0x50\n  ? kthread_park+0x80/0x80\n  ret_from_fork_asm+0x11/0x20\n\n  __schedule+0x47c/0xbb0\n  ? xas_find+0x161/0x1a0\n  schedule+0x1c/0xa0\n  blk_mq_freeze_queue_wait+0x3d/0x70\n  ? destroy_sched_domains_rcu+0x30/0x30\n  blk_mq_update_tag_set_shared+0x44/0x80\n  blk_mq_exit_queue+0x141/0x150\n  del_gendisk+0x25a/0x2d0\n  nvme_ns_remove+0xc9/0x170\n  nvme_remove_namespaces+0xc7/0x100\n  nvme_remove+0x62/0x150\n  pci_device_remove+0x23/0x60\n  device_release_driver_internal+0x159/0x200\n  unbind_store+0x99/0xa0\n  kernfs_fop_write_iter+0x112/0x1e0\n  vfs_write+0x2b1/0x3d0\n  ksys_write+0x4e/0xb0\n  do_syscall_64+0x5b/0x160\n  entry_SYSCALL_64_after_hwframe+0x4b/0x53\n\nThe top stacktrace is showing nvme_timeout() called to handle nvme\ncommand timeout. timeout handler is trying to disable the controller and\nas a first step, it needs to blk_mq_quiesce_tagset() to tell blk-mq not\nto call queue callback handlers. The thread is stuck waiting for\nset-\u003etag_list_lock as it tries to walk the queues in set-\u003etag_list.\n\nThe lock is held by the second thread in the bottom stack which is\nwaiting for one of queues to be frozen. The queue usage counter will\ndrop to zero after nvme_timeout() finishes, and this will not happen\nbecause the thread will wait for this mutex forever.\n\nGiven that [un]quiescing queue is an operation that does not need to\nsleep, update blk_mq_[un]quiesce_tagset() to use RCU instead of taking\nset-\u003etag_list_lock, update blk_mq_{add,del}_queue_tag_set() to use RCU\nsafe list operations. Also, delete INIT_LIST_HEAD(\u0026q-\u003etag_set_list)\nin blk_mq_del_queue_tag_set() because we can not re-initialize it while\nthe list is being traversed under RCU. The deleted queue will not be\nadded/deleted to/from a tagset and it will be freed in blk_free_queue()\nafter the end of RCU grace period.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68756",
          "url": "https://www.suse.com/security/cve/CVE-2025-68756"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255942 for CVE-2025-68756",
          "url": "https://bugzilla.suse.com/1255942"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68756"
    },
    {
      "cve": "CVE-2025-68757",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68757"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vgem-fence: Fix potential deadlock on release\n\nA timer that expires a vgem fence automatically in 10 seconds is now\nreleased with timer_delete_sync() from fence-\u003eops.release() called on last\ndma_fence_put().  In some scenarios, it can run in IRQ context, which is\nnot safe unless TIMER_IRQSAFE is used.  One potentially risky scenario was\ndemonstrated in Intel DRM CI trybot, BAT run on machine bat-adlp-6, while\nworking on new IGT subtests syncobj_timeline@stress-* as user space\nreplacements of some problematic test cases of a dma-fence-chain selftest\n[1].\n\n[117.004338] ================================\n[117.004340] WARNING: inconsistent lock state\n[117.004342] 6.17.0-rc7-CI_DRM_17270-g7644974e648c+ #1 Tainted: G S   U\n[117.004346] --------------------------------\n[117.004347] inconsistent {HARDIRQ-ON-W} -\u003e {IN-HARDIRQ-W} usage.\n[117.004349] swapper/0/0 [HC1[1]:SC1[1]:HE0:SE0] takes:\n[117.004352] ffff888138f86aa8 ((\u0026fence-\u003etimer)){?.-.}-{0:0}, at: __timer_delete_sync+0x4b/0x190\n[117.004361] {HARDIRQ-ON-W} state was registered at:\n[117.004363]   lock_acquire+0xc4/0x2e0\n[117.004366]   call_timer_fn+0x80/0x2a0\n[117.004368]   __run_timers+0x231/0x310\n[117.004370]   run_timer_softirq+0x76/0xe0\n[117.004372]   handle_softirqs+0xd4/0x4d0\n[117.004375]   __irq_exit_rcu+0x13f/0x160\n[117.004377]   irq_exit_rcu+0xe/0x20\n[117.004379]   sysvec_apic_timer_interrupt+0xa0/0xc0\n[117.004382]   asm_sysvec_apic_timer_interrupt+0x1b/0x20\n[117.004385]   cpuidle_enter_state+0x12b/0x8a0\n[117.004388]   cpuidle_enter+0x2e/0x50\n[117.004393]   call_cpuidle+0x22/0x60\n[117.004395]   do_idle+0x1fd/0x260\n[117.004398]   cpu_startup_entry+0x29/0x30\n[117.004401]   start_secondary+0x12d/0x160\n[117.004404]   common_startup_64+0x13e/0x141\n[117.004407] irq event stamp: 2282669\n[117.004409] hardirqs last  enabled at (2282668): [\u003cffffffff8289db71\u003e] _raw_spin_unlock_irqrestore+0x51/0x80\n[117.004414] hardirqs last disabled at (2282669): [\u003cffffffff82882021\u003e] sysvec_irq_work+0x11/0xc0\n[117.004419] softirqs last  enabled at (2254702): [\u003cffffffff8289fd00\u003e] __do_softirq+0x10/0x18\n[117.004423] softirqs last disabled at (2254725): [\u003cffffffff813d4ddf\u003e] __irq_exit_rcu+0x13f/0x160\n[117.004426]\nother info that might help us debug this:\n[117.004429]  Possible unsafe locking scenario:\n[117.004432]        CPU0\n[117.004433]        ----\n[117.004434]   lock((\u0026fence-\u003etimer));\n[117.004436]   \u003cInterrupt\u003e\n[117.004438]     lock((\u0026fence-\u003etimer));\n[117.004440]\n *** DEADLOCK ***\n[117.004443] 1 lock held by swapper/0/0:\n[117.004445]  #0: ffffc90000003d50 ((\u0026fence-\u003etimer)){?.-.}-{0:0}, at: call_timer_fn+0x7a/0x2a0\n[117.004450]\nstack backtrace:\n[117.004453] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G S   U              6.17.0-rc7-CI_DRM_17270-g7644974e648c+ #1 PREEMPT(voluntary)\n[117.004455] Tainted: [S]=CPU_OUT_OF_SPEC, [U]=USER\n[117.004455] Hardware name: Intel Corporation Alder Lake Client Platform/AlderLake-P DDR4 RVP, BIOS RPLPFWI1.R00.4035.A00.2301200723 01/20/2023\n[117.004456] Call Trace:\n[117.004456]  \u003cIRQ\u003e\n[117.004457]  dump_stack_lvl+0x91/0xf0\n[117.004460]  dump_stack+0x10/0x20\n[117.004461]  print_usage_bug.part.0+0x260/0x360\n[117.004463]  mark_lock+0x76e/0x9c0\n[117.004465]  ? register_lock_class+0x48/0x4a0\n[117.004467]  __lock_acquire+0xbc3/0x2860\n[117.004469]  lock_acquire+0xc4/0x2e0\n[117.004470]  ? __timer_delete_sync+0x4b/0x190\n[117.004472]  ? __timer_delete_sync+0x4b/0x190\n[117.004473]  __timer_delete_sync+0x68/0x190\n[117.004474]  ? __timer_delete_sync+0x4b/0x190\n[117.004475]  timer_delete_sync+0x10/0x20\n[117.004476]  vgem_fence_release+0x19/0x30 [vgem]\n[117.004478]  dma_fence_release+0xc1/0x3b0\n[117.004480]  ? dma_fence_release+0xa1/0x3b0\n[117.004481]  dma_fence_chain_release+0xe7/0x130\n[117.004483]  dma_fence_release+0xc1/0x3b0\n[117.004484]  ? _raw_spin_unlock_irqrestore+0x27/0x80\n[117.004485]  dma_fence_chain_irq_work+0x59/0x80\n[117.004487]  irq_work_single+0x75/0xa0\n[117.004490]  irq_work_r\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68757",
          "url": "https://www.suse.com/security/cve/CVE-2025-68757"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255943 for CVE-2025-68757",
          "url": "https://bugzilla.suse.com/1255943"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68757"
    },
    {
      "cve": "CVE-2025-68758",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68758"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbacklight: led-bl: Add devlink to supplier LEDs\n\nLED Backlight is a consumer of one or multiple LED class devices, but\ndevlink is currently unable to create correct supplier-producer links when\nthe supplier is a class device. It creates instead a link where the\nsupplier is the parent of the expected device.\n\nOne consequence is that removal order is not correctly enforced.\n\nIssues happen for example with the following sections in a device tree\noverlay:\n\n    // An LED driver chip\n    pca9632@62 {\n        compatible = \"nxp,pca9632\";\n        reg = \u003c0x62\u003e;\n\n\t// ...\n\n        addon_led_pwm: led-pwm@3 {\n            reg = \u003c3\u003e;\n            label = \"addon:led:pwm\";\n        };\n    };\n\n    backlight-addon {\n        compatible = \"led-backlight\";\n        leds = \u003c\u0026addon_led_pwm\u003e;\n        brightness-levels = \u003c255\u003e;\n        default-brightness-level = \u003c255\u003e;\n    };\n\nIn this example, the devlink should be created between the backlight-addon\n(consumer) and the pca9632@62 (supplier). Instead it is created between the\nbacklight-addon (consumer) and the parent of the pca9632@62, which is\ntypically the I2C bus adapter.\n\nOn removal of the above overlay, the LED driver can be removed before the\nbacklight device, resulting in:\n\n    Unable to handle kernel NULL pointer dereference at virtual address 0000000000000010\n    ...\n    Call trace:\n     led_put+0xe0/0x140\n     devm_led_release+0x6c/0x98\n\nAnother way to reproduce the bug without any device tree overlays is\nunbinding the LED class device (pca9632@62) before unbinding the consumer\n(backlight-addon):\n\n  echo 11-0062 \u003e/sys/bus/i2c/drivers/leds-pca963x/unbind\n  echo ...backlight-dock \u003e/sys/bus/platform/drivers/led-backlight/unbind\n\nFix by adding a devlink between the consuming led-backlight device and the\nsupplying LED device, as other drivers and subsystems do as well.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68758",
          "url": "https://www.suse.com/security/cve/CVE-2025-68758"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255944 for CVE-2025-68758",
          "url": "https://bugzilla.suse.com/1255944"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68758"
    },
    {
      "cve": "CVE-2025-68759",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68759"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring()\n\nIn rtl8180_init_rx_ring(), memory is allocated for skb packets and DMA\nallocations in a loop. When an allocation fails, the previously\nsuccessful allocations are not freed on exit.\n\nFix that by jumping to err_free_rings label on error, which calls\nrtl8180_free_rx_ring() to free the allocations. Remove the free of\nrx_ring in rtl8180_init_rx_ring() error path, and set the freed\npriv-\u003erx_buf entry to null, to avoid double free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68759",
          "url": "https://www.suse.com/security/cve/CVE-2025-68759"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255934 for CVE-2025-68759",
          "url": "https://bugzilla.suse.com/1255934"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68759"
    },
    {
      "cve": "CVE-2025-68760",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68760"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/amd: Fix potential out-of-bounds read in iommu_mmio_show\n\nIn iommu_mmio_write(), it validates the user-provided offset with the\ncheck: `iommu-\u003edbg_mmio_offset \u003e iommu-\u003emmio_phys_end - 4`.\nThis assumes a 4-byte access. However, the corresponding\nshow handler, iommu_mmio_show(), uses readq() to perform an 8-byte\n(64-bit) read.\n\nIf a user provides an offset equal to `mmio_phys_end - 4`, the check\npasses, and will lead to a 4-byte out-of-bounds read.\n\nFix this by adjusting the boundary check to use sizeof(u64), which\ncorresponds to the size of the readq() operation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68760",
          "url": "https://www.suse.com/security/cve/CVE-2025-68760"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255935 for CVE-2025-68760",
          "url": "https://bugzilla.suse.com/1255935"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68760"
    },
    {
      "cve": "CVE-2025-68761",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68761"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfs: fix potential use after free in hfs_correct_next_unused_CNID()\n\nThis code calls hfs_bnode_put(node) which drops the refcount and then\ndreferences \"node\" on the next line.  It\u0027s only safe to use \"node\"\nwhen we\u0027re holding a reference so flip these two lines around.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68761",
          "url": "https://www.suse.com/security/cve/CVE-2025-68761"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255936 for CVE-2025-68761",
          "url": "https://bugzilla.suse.com/1255936"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-68761"
    },
    {
      "cve": "CVE-2025-68762",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68762"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: netpoll: initialize work queue before error checks\n\nPrevent a kernel warning when netconsole setup fails on devices with\nIFF_DISABLE_NETPOLL flag. The warning (at kernel/workqueue.c:4242 in\n__flush_work) occurs because the cleanup path tries to cancel an\nuninitialized work queue.\n\nWhen __netpoll_setup() encounters a device with IFF_DISABLE_NETPOLL,\nit fails early and calls skb_pool_flush() for cleanup. This function\ncalls cancel_work_sync(\u0026np-\u003erefill_wq), but refill_wq hasn\u0027t been\ninitialized yet, triggering the warning.\n\nMove INIT_WORK() to the beginning of __netpoll_setup(), ensuring the\nwork queue is properly initialized before any potential failure points.\nThis allows the cleanup path to safely cancel the work queue regardless\nof where the setup fails.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68762",
          "url": "https://www.suse.com/security/cve/CVE-2025-68762"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255937 for CVE-2025-68762",
          "url": "https://bugzilla.suse.com/1255937"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2025-68762"
    },
    {
      "cve": "CVE-2025-68763",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68763"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: starfive - Correctly handle return of sg_nents_for_len\n\nThe return value of sg_nents_for_len was assigned to an unsigned long\nin starfive_hash_digest, causing negative error codes to be converted\nto large positive integers.\n\nAdd error checking for sg_nents_for_len and return immediately on\nfailure to prevent potential buffer overflows.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68763",
          "url": "https://www.suse.com/security/cve/CVE-2025-68763"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255929 for CVE-2025-68763",
          "url": "https://bugzilla.suse.com/1255929"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68763"
    },
    {
      "cve": "CVE-2025-68764",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68764"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags\n\nWhen a filesystem is being automounted, it needs to preserve the\nuser-set superblock mount options, such as the \"ro\" flag.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68764",
          "url": "https://www.suse.com/security/cve/CVE-2025-68764"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255930 for CVE-2025-68764",
          "url": "https://bugzilla.suse.com/1255930"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68764"
    },
    {
      "cve": "CVE-2025-68765",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68765"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add()\n\nIn mt7615_mcu_wtbl_sta_add(), an skb sskb is allocated. If the\nsubsequent call to mt76_connac_mcu_alloc_wtbl_req() fails, the function\nreturns an error without freeing sskb, leading to a memory leak.\n\nFix this by calling dev_kfree_skb() on sskb in the error handling path\nto ensure it is properly released.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68765",
          "url": "https://www.suse.com/security/cve/CVE-2025-68765"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255931 for CVE-2025-68765",
          "url": "https://bugzilla.suse.com/1255931"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68765"
    },
    {
      "cve": "CVE-2025-68766",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68766"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nirqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc()\n\nIf irq_domain_translate_twocell() sets \"hwirq\" to \u003e= MCHP_EIC_NIRQ (2) then\nit results in an out of bounds access.\n\nThe code checks for invalid values, but doesn\u0027t set the error code.  Return\n-EINVAL in that case, instead of returning success.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68766",
          "url": "https://www.suse.com/security/cve/CVE-2025-68766"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255932 for CVE-2025-68766",
          "url": "https://bugzilla.suse.com/1255932"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.18.16-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.18.16-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-03-07T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-68766"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…