<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:2394-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-07-10T16:03:48Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-07-10T16:03:48Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-07-10T16:03:48Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2021-47089: kfence: fix memory leak when cat kfence objects (bsc#1220958.
- CVE-2021-47432: lib/generic-radix-tree.c: Do not overflow in peek() (bsc#1225391).
- CVE-2021-47515: seg6: fix the iif in the IPv6 socket control block (bsc#1225426).
- CVE-2021-47538: rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() (bsc#1225448).
- CVE-2021-47539: rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle() (bsc#1225452).
- CVE-2021-47555: net: vlan: fix underflow for the real_dev refcnt (bsc#1225467).
- CVE-2021-47566: Fix clearing user buffer by properly using clear_user() (bsc#1225514).
- CVE-2021-47571: staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() (bsc#1225518).
- CVE-2021-47572: net: nexthop: fix null pointer dereference when IPv6 is not enabled (bsc#1225389).
- CVE-2022-48716: ASoC: codecs: wcd938x: fix incorrect used of portid (bsc#1226678).
- CVE-2023-24023: Bluetooth: Add more enc key size check (bsc#1218148).
- CVE-2023-52622: ext4: avoid online resizing failures due to oversized flex bg (bsc#1222080).
- CVE-2023-52658: Revert 'net/mlx5: Block entering switchdev mode with ns inconsistency' (bsc#1224719).
- CVE-2023-52667: net/mlx5e: fix a potential double-free in fs_any_create_groups (bsc#1224603).
- CVE-2023-52670: rpmsg: virtio: Free driver_override when rpmsg_remove() (bsc#1224696).
- CVE-2023-52672: pipe: wakeup wr_wait after setting max_usage (bsc#1224614).
- CVE-2023-52675: powerpc/imc-pmu: Add a null pointer check in update_events_in_group() (bsc#1224504).
- CVE-2023-52735: bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself (bsc#1225475).
- CVE-2023-52737: btrfs: lock the inode in shared mode before starting fiemap (bsc#1225484).
- CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487).
- CVE-2023-52784: bonding: stop the device in bond_setup_by_slave() (bsc#1224946).
- CVE-2023-52787: blk-mq: make sure active queue usage is held for bio_integrity_prep() (bsc#1225105).
- CVE-2023-52835: perf/core: Bail out early if the request AUX area is out of bound (bsc#1225602).
- CVE-2023-52837: nbd: fix uaf in nbd_open (bsc#1224935).
- CVE-2023-52843: llc: verify mac len before reading mac header (bsc#1224951).
- CVE-2023-52845: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING (bsc#1225585).
- CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225098).
- CVE-2023-52869: pstore/platform: Add check for kstrdup (bsc#1225050).
- CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611).
- CVE-2023-52882: clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change (bsc#1225692).
- CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)
- CVE-2024-26644: btrfs: do not abort filesystem when attempting to snapshot deleted subvolume (bsc#1221282, bsc#1222072).
- CVE-2024-26720: mm: Avoid overflows in dirty throttling logic (bsc#1222364).
- CVE-2024-26845: scsi: target: core: Add TMF to tmr_list handling (bsc#1223018).
- CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223384).
- CVE-2024-26973: fat: fix uninitialized field in nostale filehandles (bsc#1223641).
- CVE-2024-27432: net: ethernet: mtk_eth_soc: fix PPE hanging issue (bsc#1224716).
- CVE-2024-35247: fpga: region: add owner module and take its refcount (bsc#1226948).
- CVE-2024-35789: Check fast rx for non-4addr sta VLAN changes (bsc#1224749).
- CVE-2024-35790: usb: typec: altmodes/displayport: create sysfs nodes as driver's default device attribute group (bsc#1224712).
- CVE-2024-35807: ext4: fix corruption during on-line resize (bsc#1224735).
- CVE-2024-35835: net/mlx5e: fix a double-free in arfs_create_groups (bsc#1224605).
- CVE-2024-35848: eeprom: at24: fix memory corruption race condition (bsc#1224612).
- CVE-2024-35857: icmp: prevent possible NULL dereferences from icmp_build_probe() (bsc#1224619).
- CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1224766).
- CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764).
- CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765).
- CVE-2024-35869: smb: client: guarantee refcounted children from parent session (bsc#1224679).
- CVE-2024-35884: udp: do not accept non-tunnel GSO skbs landing in a tunnel (bsc#1224520).
- CVE-2024-35886: ipv6: Fix infinite recursion in fib6_dump_done() (bsc#1224670).
- CVE-2024-35898: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (bsc#1224498).
- CVE-2024-35900: netfilter: nf_tables: reject new basechain after table flag update (bsc#1224497).
- CVE-2024-35925: block: prevent division by zero in blk_rq_stat_sum() (bsc#1224661).
- CVE-2024-35950: drm/client: Fully protect modes with dev-&gt;mode_config.mutex (bsc#1224703).
- CVE-2024-35956: Fixed qgroup prealloc rsv leak in subvolume operations (bsc#1224674)
- CVE-2024-35958: net: ena: Fix incorrect descriptor free behavior (bsc#1224677).
- CVE-2024-35960: net/mlx5: Properly link new fs rules into the tree (bsc#1224588).
- CVE-2024-35997: Remove I2C_HID_READ_PENDING flag to prevent lock-up (bsc#1224552).
- CVE-2024-36005: netfilter: nf_tables: honor table dormant flag from netdev release event path (bsc#1224539).
- CVE-2024-36008: ipv4: check for NULL idev in ip_route_use_hint() (bsc#1224540).
- CVE-2024-36017: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation (bsc#1225681).
- CVE-2024-36020: i40e: fix vf may be used uninitialized in this function warning (bsc#1225698).
- CVE-2024-36021: net: hns3: fix kernel crash when devlink reload during pf initialization (bsc#1225699).
- CVE-2024-36478: null_blk: fix null-ptr-dereference while configuring 'power' and 'submit_queues' (bsc#1226841).
- CVE-2024-36479: fpga: bridge: add owner module and take its refcount (bsc#1226949).
- CVE-2024-36890: mm/slab: make __free(kfree) accept error pointers (bsc#1225714).
- CVE-2024-36894: usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete (bsc#1225749).
- CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225737).
- CVE-2024-36900: net: hns3: fix kernel crash when devlink reload during initialization (bsc#1225726).
- CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225732).
- CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies (bsc#1225758).
- CVE-2024-36916: blk-iocost: avoid out of bounds shift (bsc#1225759).
- CVE-2024-36917: block: fix overflow in blk_ioctl_discard() (bsc#1225770).
- CVE-2024-36919: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload (bsc#1225767).
- CVE-2024-36934: bna: ensure the copied buf is NUL terminated (bsc#1225760).
- CVE-2024-36937: xdp: use flags field to disambiguate broadcast redirect (bsc#1225834).
- CVE-2024-36940: pinctrl: core: delete incorrect free in pinctrl_enable() (bsc#1225840).
- CVE-2024-36945: net/smc: fix neighbour and rtable leak in smc_ib_find_route() (bsc#1225823).
- CVE-2024-36949: amd/amdkfd: sync all devices to wait all processes being evicted (bsc#1225872)
- CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1225866).
- CVE-2024-36971: net: fix __dst_negative_advice() race (bsc#1226145).
- CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514).
- CVE-2024-37021: fpga: manager: add owner module and take its refcount (bsc#1226950).
- CVE-2024-37078: nilfs2: fix potential kernel bug due to lack of writeback flag waiting (bsc#1227066).
- CVE-2024-37354: btrfs: fix crash on racing fsync and size-extending write into prealloc (bsc#1227101).
- CVE-2024-38541: of: module: add buffer overflow check in of_modalias() (bsc#1226587).
- CVE-2024-38545: RDMA/hns: Fix UAF for cq async event (bsc#1226595).
- CVE-2024-38553: net: fec: remove .ndo_poll_controller to avoid deadlock (bsc#1226744).
- CVE-2024-38555: net/mlx5: Discard command completions in internal error (bsc#1226607).
- CVE-2024-38556: net/mlx5: Add a timeout to acquire the command queue semaphore (bsc#1226774).
- CVE-2024-38557: net/mlx5: Reload only IB representors upon lag disable/enable (bsc#1226781).
- CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226785).
- CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786).
- CVE-2024-38564: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE (bsc#1226789).
- CVE-2024-38568: drivers/perf: hisi: hns3: Fix out-of-bound access when valid event group (bsc#1226771).
- CVE-2024-38578: ecryptfs: Fix buffer size for tag 66 packet (bsc#1226634).
- CVE-2024-38580: epoll: be better about file lifetimes (bsc#1226610).
- CVE-2024-38594: net: stmmac: move the EST lock to struct stmmac_priv (bsc#1226734).
- CVE-2024-38597: eth: sungem: remove .ndo_poll_controller to avoid deadlocks (bsc#1226749).
- CVE-2024-38603: drivers/perf: hisi: hns3: Actually use devm_add_action_or_reset() (bsc#1226842).
- CVE-2024-38608: net/mlx5e: Fix netif state handling (bsc#1226746).
- CVE-2024-38627: stm class: Fix a double free in stm_register_device() (bsc#1226857).
- CVE-2024-38659: enic: Validate length of nl attributes in enic_set_vf_port (bsc#1226883).
- CVE-2024-38661: s390/ap: Fix crash in AP internal function modify_bitmap() (bsc#1226996).
- CVE-2024-38780: dma-buf/sw-sync: do not enable IRQ from sync_print_obj() (bsc#1226886).
- CVE-2024-39301: net/9p: fix uninit-value in p9_client_rpc() (bsc#1226994).
- CVE-2024-39468: smb: client: fix deadlock in smb2_find_smb_tcon() (bsc#1227103.
- CVE-2024-39469: nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors (bsc#1226992).

The following non-security bugs were fixed:

- ACPI: resource: Do IRQ override on TongFang GXxHRXx and GMxHGxx (stable-fixes).
- ACPICA: Revert 'ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine.' (git-fixes).
- ALSA/hda: intel-dsp-config: Document AVS as dsp_driver option (git-fixes).
- ALSA: Fix deadlocks with kctl removals at disconnection (stable-fixes).
- ALSA: hda/realtek: Add quirks for Lenovo 13X (stable-fixes).
- ALSA: hda/realtek: Adjust G814JZR to use SPI init for amp (git-fixes).
- ALSA: hda/realtek: Enable headset mic on IdeaPad 330-17IKB 81DM (git-fixes).
- ALSA: hda/realtek: Fix conflicting quirk for PCI SSID 17aa:3820 (git-fixes).
- ALSA: hda/realtek: Limit mic boost on N14AP7 (stable-fixes).
- ALSA: hda/realtek: Remove Framework Laptop 16 from quirks (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs do not work for ProBook 440/460 G11 (stable-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs do not work for ProBook 445/465 G11 (stable-fixes).
- ALSA: hda: intel-dsp-config: harden I2C/I2S codec detection (stable-fixes).
- ALSA: timer: Set lower bound of start tick time (stable-fixes).
- ASoC: amd: acp: add a null check for chip_pdev structure (git-fixes).
- ASoC: amd: acp: remove i2s configuration check in acp_i2s_probe() (git-fixes).
- ASoC: da7219-aad: fix usage of device_get_named_child_node() (stable-fixes).
- ASoC: fsl-asoc-card: set priv-&gt;pdev before using it (git-fixes).
- ASoC: rt5645: Fix the electric noise due to the CBJ contacts floating (stable-fixes).
- ASoC: rt715-sdca: volume step modification (stable-fixes).
- ASoC: rt715: add vendor clear control register (stable-fixes).
- Add remote for nfs maintainer
- Bluetooth: L2CAP: Fix rejecting L2CAP_CONN_PARAM_UPDATE_REQ (git-fixes).
- Fix new build warnings regarding unused variables: Changed build warnings: ***** 2 warnings ***** * unused-variable (cl) in ../fs/ceph/mds_client.c in ceph_queue_cap_unlink_work ../fs/ceph/mds_client.c: In function 'ceph_queue_cap_unlink_work': ../fs/ceph/mds_client.c:2421:22: warning: unused variable 'cl' [-Wunused-variable] * unused-variable (cl) in ../fs/ceph/mds_client.c in ceph_cap_unlink_work ../fs/ceph/mds_client.c: In function 'ceph_cap_unlink_work': ../fs/ceph/mds_client.c:2436:22: warning: unused variable 'cl' [-Wunused-variable]
- HID: core: remove unnecessary WARN_ON() in implement() (git-fixes).
- HID: logitech-dj: Fix memory leak in logi_dj_recv_switch_to_dj_mode() (git-fixes).
- Input: ili210x - fix ili251x_read_touch_data() return value (git-fixes).
- NFS: abort nfs_atomic_open_v23 if name is too long (bsc#1219847).
- NFS: add atomic_open for NFSv3 to handle O_TRUNC correctly (bsc#1219847).
- NFS: avoid infinite loop in pnfs_update_layout (bsc#1219633 bsc#1226226).
- PCI/ASPM: Update save_state when configuration changes (bsc#1226915)
- PCI: Clear Secondary Status errors after enumeration (bsc#1226928)
- RAS/AMD/ATL: Fix MI300 bank hash (bsc#1225300).
- RAS/AMD/ATL: Use system settings for MI300 DRAM to normalized address translation (bsc#1225300).
- RDMA/hns: Fix incorrect sge nums calculation (git-fixes)
- RDMA/irdma: Drop unused kernel push code (git-fixes)
- RDMA/mlx5: Add check for srq max_sge attribute (git-fixes)
- Revert 'Add remote for nfs maintainer'
- Revert 'build initrd without systemd' (bsc#1195775)'
- USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (git-fixes).
- USB: xen-hcd: Traverse host/ when CONFIG_USB_XEN_HCD is selected (git-fixes).
- X.509: Fix the parser of extended key usage for length (bsc#1218820).
- arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY (git-fixes).
- arm64: mm: Batch dsb and isb when populating pgtables (jsc#PED-8690).
- arm64: mm: Do not remap pgtables for allocate vs populate (jsc#PED-8690).
- arm64: mm: Do not remap pgtables per-cont(pte|pmd) block (jsc#PED-8690).
- arm64: mm: do not acquire mutex when rewriting swapper (jsc#PED-8690).
- ata: ahci: Clean up sysfs file on error (git-fixes).
- ata: libata-core: Fix double free on error (git-fixes).
- ata: libata-core: Fix null pointer dereference on error (git-fixes).
- batman-adv: Do not accept TT entries for out-of-spec VIDs (git-fixes).
- bpf, sockmap: Check for any of tcp_bpf_prots when cloning a listener (git-fixes).
- btrfs: avoid copying BTRFS_ROOT_SUBVOL_DEAD flag to snapshot of subvolume being deleted (bsc#1221282).
- cachefiles: remove requests from xarray during flushing requests (bsc#1226588).
- ceph: add ceph_cap_unlink_work to fire check_caps() immediately (bsc#1226022).
- ceph: always check dir caps asynchronously (bsc#1226022).
- ceph: always queue a writeback when revoking the Fb caps (bsc#1226022).
- ceph: break the check delayed cap loop every 5s (bsc#1226022).
- ceph: switch to use cap_delay_lock for the unlink delay list (bsc#1226022).
- cgroup: Add annotation for holding namespace_sem in current_cgns_cgroup_from_root() (bsc#1222254).
- cgroup: Eliminate the need for cgroup_mutex in proc_cgroup_show() (bsc#1222254).
- cgroup: Make operations on the cgroup root_list RCU safe (bsc#1222254).
- cgroup: Remove unnecessary list_empty() (bsc#1222254).
- cgroup: preserve KABI of cgroup_root (bsc#1222254).
- cifs: fix hang in wait_for_response() (bsc#1220812, bsc#1220368).
- cpufreq: amd-pstate: Fix the inconsistency in max frequency units (git-fixes).
- crypto: ecrdsa - Fix module auto-load on add_key (stable-fixes).
- dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list (git-fixes).
- dmaengine: ioatdma: Fix missing kmem_cache_destroy() (git-fixes).
- drivers: core: synchronize really_probe() and dev_uevent() (git-fixes).
- drm/amd/display: Add VCO speed parameter for DCN31 FPU (stable-fixes).
- drm/amd/display: Add dtbclk access to dcn315 (stable-fixes).
- drm/amd/display: Exit idle optimizations before HDCP execution (stable-fixes).
- drm/amd/display: Set color_mgmt_changed to true on unsuspend (stable-fixes).
- drm/amd/display: drop unnecessary NULL checks in debugfs (stable-fixes).
- drm/amd/display: revert Exit idle optimizations before HDCP execution (stable-fixes).
- drm/amd: Fix shutdown (again) on some SMU v13.0.4/11 platforms (git-fixes).
- drm/amdgpu/atomfirmware: add intergrated info v2.3 table (stable-fixes).
- drm/amdgpu/mes: fix use-after-free issue (stable-fixes).
- drm/amdgpu: Fix the ring buffer size for queue VM flush (stable-fixes).
- drm/amdgpu: Update BO eviction priorities (stable-fixes).
- drm/amdgpu: add error handle to avoid out-of-bounds (stable-fixes).
- drm/amdgpu: fix UBSAN warning in kv_dpm.c (stable-fixes).
- drm/amdkfd: Flush the process wq before creating a kfd_process (stable-fixes).
- drm/amdkfd: Rework kfd_locked handling (bsc#1225872)
- drm/bridge/panel: Fix runtime warning on panel bridge release (git-fixes).
- drm/exynos/vidi: fix memory leak in .get_modes() (stable-fixes).
- drm/exynos: hdmi: report safe 640x480 mode as a fallback when no EDID found (git-fixes).
- drm/i915/dpt: Make DPT object unshrinkable (git-fixes).
- drm/i915/gt: Disarm breadcrumbs if engines are already idle (git-fixes).
- drm/i915/gt: Fix potential UAF by revoke of fence registers (git-fixes).
- drm/i915/guc: avoid FIELD_PREP warning (git-fixes).
- drm/i915/mso: using joiner is not possible with eDP MSO (git-fixes).
- drm/komeda: check for error-valued pointer (git-fixes).
- drm/lima: add mask irq callback to gp and pp (stable-fixes).
- drm/lima: mask irqs in timeout path before hard reset (stable-fixes).
- drm/msm/a6xx: Avoid a nullptr dereference when speedbin setting fails (git-fixes).
- drm/msm/dp: Avoid a long timeout for AUX transfer if nothing connected (git-fixes).
- drm/msm/dp: Return IRQ_NONE for unhandled interrupts (stable-fixes).
- drm/msm: Enable clamp_to_idle for 7c3 (stable-fixes).
- drm/panel-samsung-atna33xc20: Use ktime_get_boottime for delays (stable-fixes).
- drm/panel: simple: Add missing display timing flags for KOE TX26D202VM0BWA (git-fixes).
- drm/radeon: fix UBSAN warning in kv_dpm.c (stable-fixes).
- drm/vmwgfx: 3D disabled should not effect STDU memory limits (git-fixes).
- drm/vmwgfx: Filter modes which exceed graphics memory (git-fixes).
- gpio: davinci: Validate the obtained number of IRQs (git-fixes).
- gpio: tqmx86: fix typo in Kconfig label (git-fixes).
- gpio: tqmx86: introduce shadow register for GPIO output value (git-fixes).
- gpiolib: cdev: Disallow reconfiguration without direction (uAPI v1) (git-fixes).
- hwmon: (shtc1) Fix property misspelling (git-fixes).
- i2c: at91: Fix the functionality flags of the slave-only interface (git-fixes).
- i2c: designware: Fix the functionality flags of the slave-only interface (git-fixes).
- i2c: ocores: set IACK bit after core is enabled (git-fixes).
- i2c: testunit: discard write requests while old command is running (git-fixes).
- i2c: testunit: do not erase registers after STOP (git-fixes).
- iio: accel: fxls8962af: select IIO_BUFFER &amp; IIO_KFIFO_BUF (git-fixes).
- iio: adc: ad7266: Fix variable checking bug (git-fixes).
- iio: adc: ad9467: fix scan type sign (git-fixes).
- iio: chemical: bme680: Fix calibration data variable (git-fixes).
- iio: chemical: bme680: Fix overflows in compensate() functions (git-fixes).
- iio: chemical: bme680: Fix pressure value output (git-fixes).
- iio: chemical: bme680: Fix sensor data read operation (git-fixes).
- iio: dac: ad5592r: fix temperature channel scaling value (git-fixes).
- iio: imu: inv_icm42600: delete unneeded update watermark call (git-fixes).
- intel_th: pci: Add Meteor Lake-S CPU support (stable-fixes).
- iommu/amd: Fix sysfs leak in iommu init (git-fixes).
- iommu: Return right value in iommu_sva_bind_device() (git-fixes).
- iommu: mtk: fix module autoloading (git-fixes).
- ipvs: Fix checksumming on GSO of SCTP packets (bsc#1221958)
- kbuild: Install dtb files as 0644 in Makefile.dtbinst (git-fixes).
- kbuild: do not include include/config/auto.conf from shell scripts (bsc#1227274).
- kconfig: doc: fix a typo in the note about 'imply' (git-fixes).
- kconfig: fix comparison to constant symbols, 'm', 'n' (git-fixes).
- kernel-doc: fix struct_group_tagged() parsing (git-fixes).
- lib: memcpy_kunit: Fix an invalid format specifier in an assertion msg (git-fixes).
- media: flexcop-usb: clean up endpoint sanity checks (stable-fixes).
- media: flexcop-usb: fix sanity check of bNumEndpoints (git-fixes).
- media: ipu3-cio2: Use temporary storage for struct device pointer (stable-fixes).
- media: lgdt3306a: Add a check against null-pointer-def (stable-fixes).
- media: mxl5xx: Move xpt structures off stack (stable-fixes).
- media: radio-shark2: Avoid led_names truncations (git-fixes).
- media: v4l2-core: hold videodev_lock until dev reg, finishes (stable-fixes).
- mei: me: release irq in mei_me_pci_resume error path (git-fixes).
- mkspec-dtb: add toplevel symlinks also on arm
- mmc: core: Add mmc_gpiod_set_cd_config() function (stable-fixes).
- mmc: core: Do not force a retune before RPMB switch (stable-fixes).
- mmc: sdhci-acpi: Disable write protect detection on Toshiba WT10-A (stable-fixes).
- mmc: sdhci-acpi: Fix Lenovo Yoga Tablet 2 Pro 1380 sdcard slot not working (stable-fixes).
- mmc: sdhci-acpi: Sort DMI quirks alphabetically (stable-fixes).
- mmc: sdhci-pci: Convert PCIBIOS_* return codes to errnos (git-fixes).
- mmc: sdhci: Do not invert write-protect twice (git-fixes).
- mmc: sdhci: Do not lock spinlock around mmc_gpio_get_ro() (git-fixes).
- mmc: sdhci_am654: Add ITAPDLYSEL in sdhci_j721e_4bit_set_clock (git-fixes).
- mmc: sdhci_am654: Add OTAP/ITAP delay enable (git-fixes).
- mmc: sdhci_am654: Drop lookup for deprecated ti,otap-del-sel (stable-fixes).
- mmc: sdhci_am654: Fix ITAPDLY for HS400 timing (git-fixes).
- mtd: rawnand: Bypass a couple of sanity checks during NAND identification (git-fixes).
- mtd: rawnand: Ensure ECC configuration is propagated to upper layers (git-fixes).
- mtd: rawnand: rockchip: ensure NVDDR timings are rejected (git-fixes).
- net/mlx5e: Fix a race in command alloc flow (git-fixes).
- net: can: j1939: Initialize unused data in j1939_send_one() (git-fixes).
- net: can: j1939: enhanced error handling for tightly received RTS messages in xtp_rx_rts_session_new (git-fixes).
- net: can: j1939: recover socket queue on CAN bus error during BAM transmission (git-fixes).
- net: ena: Fix redundant device NUMA node override (jsc#PED-8690).
- net: mana: Enable MANA driver on ARM64 with 4K page size (jsc#PED-8491).
- net: phy: Micrel KSZ8061: fix errata solution not taking effect problem (git-fixes).
- net: phy: micrel: add Microchip KSZ 9477 to the device table (git-fixes).
- net: usb: ax88179_178a: improve link status logs (git-fixes).
- net: usb: ax88179_178a: improve reset check (git-fixes).
- net: usb: qmi_wwan: add Telit FN920C04 compositions (stable-fixes).
- net: usb: rtl8150 fix unintiatilzed variables in rtl8150_get_link_ksettings (git-fixes).
- net: usb: smsc95xx: fix changing LED_SEL bit value updated from EEPROM (git-fixes).
- nfsd: optimise recalculate_deny_mode() for a common case (bsc#1217912).
- nilfs2: fix potential hang in nilfs_detach_log_writer() (stable-fixes).
- nvme: find numa distance only if controller has valid numa id (git-fixes).
- nvmet-passthru: propagate status from id override functions (git-fixes).
- ocfs2: adjust enabling place for la window (bsc#1219224).
- ocfs2: fix sparse warnings (bsc#1219224).
- ocfs2: improve write IO performance when fragmentation is high (bsc#1219224).
- ocfs2: speed up chain-list searching (bsc#1219224).
- pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER (git-fixes).
- pinctrl: qcom: spmi-gpio: drop broken pm8008 support (git-fixes).
- pinctrl: rockchip: fix pinmux bits for RK3328 GPIO2-B pins (git-fixes).
- pinctrl: rockchip: fix pinmux bits for RK3328 GPIO3-B pins (git-fixes).
- pinctrl: rockchip: fix pinmux reset in rockchip_pmx_set (git-fixes).
- pinctrl: rockchip: use dedicated pinctrl type for RK3328 (git-fixes).
- random: treat bootloader trust toggle the same way as cpu trust toggle (bsc#1226953).
- regulator: bd71815: fix ramp values (git-fixes).
- regulator: core: Fix modpost error 'regulator_get_regmap' undefined (git-fixes).
- regulator: irq_helpers: duplicate IRQ name (stable-fixes).
- regulator: vqmmc-ipq4019: fix module autoloading (stable-fixes).
- rpm/kernel-obs-build.spec.in: Add iso9660 (bsc#1226212) Some builds do not just create an iso9660 image, but also mount it during build.
- rpm/kernel-obs-build.spec.in: Add networking modules for docker (bsc#1226211) docker needs more networking modules, even legacy iptable_nat and _filter.
- rpm/kernel-obs-build.spec.in: Include algif_hash, aegis128 and xts modules afgif_hash is needed by some packages (e.g. iwd) for tests, xts is used for LUKS2 volumes by default and aegis128 is useful as AEAD cipher for LUKS2. Wrap the long line to make it readable.
- rpm/mkspec-dtb: dtbs have moved to vendor sub-directories in 6.5 By commit 724ba6751532 ('ARM: dts: Move .dts files to vendor sub-directories'). So switch to them.
- sched/core: Fix incorrect initialization of the 'burst' parameter in cpu_max_write() (bsc#1226791).
- scsi: sd: Update DIX config every time sd_revalidate_disk() is called (bsc#1218570).
- smb: client: ensure to try all targets when finding nested links (bsc#1224020).
- smb: client: guarantee refcounted children from parent session (bsc#1224679).
- soundwire: cadence: fix invalid PDI offset (stable-fixes).
- spi: stm32: Do not warn about spurious interrupts (git-fixes).
- supported.conf: Add APM X-Gene SoC hardware monitoring driver (bsc#1223265 jsc#PED-8570)
- supported.conf: mark orangefs as optional We do not support orangefs at all (and it is already marked as such), but since there are no SLE consumers of it, mark it as optional.
- supported.conf: mark ufs as unsupported UFS is an unsupported filesystem, mark it as such. We still keep it around (not marking as optional), to accommodate any potential migrations from BSD systems.
- tty: mcf: MCF54418 has 10 UARTS (git-fixes).
- usb-storage: alauda: Check whether the media is initialized (git-fixes).
- usb: atm: cxacru: fix endpoint checking in cxacru_bind() (git-fixes).
- usb: dwc3: core: remove lock of otg mode during gadget suspend/resume to avoid deadlock (git-fixes).
- usb: fotg210-hcd: delete an incorrect bounds test (git-fixes).
- usb: gadget: printer: fix races against disable (git-fixes).
- usb: musb: da8xx: fix a resource leak in probe() (git-fixes).
- usb: typec: tcpm: Ignore received Hard Reset in TOGGLING state (git-fixes).
- usb: typec: tcpm: fix use-after-free case in tcpm_register_source_caps (git-fixes).
- usb: typec: ucsi: Ack also failed Get Error commands (git-fixes).
- usb: typec: ucsi: Never send a lone connector change ack (git-fixes).
- usb: xhci: Implement xhci_handshake_check_state() helper (git-fixes).
- usb: xhci: address off-by-one in xhci_num_trbs_free() (git-fixes).
- usb: xhci: improve debug message in xhci_ring_expansion_needed() (git-fixes).
- watchdog: bd9576: Drop 'always-running' property (git-fixes).
- watchdog: bd9576_wdt: switch to using devm_fwnode_gpiod_get() (stable-fixes).
- wifi: cfg80211: Lock wiphy in cfg80211_get_station (git-fixes).
- wifi: cfg80211: fix the order of arguments for trace events of the tx_rx_evt class (stable-fixes).
- wifi: cfg80211: pmsr: use correct nla_get_uX functions (git-fixes).
- wifi: iwlwifi: dbg_ini: move iwl_dbg_tlv_free outside of debugfs ifdef (git-fixes).
- wifi: iwlwifi: mvm: check n_ssids before accessing the ssids (git-fixes).
- wifi: iwlwifi: mvm: do not read past the mfuart notifcation (git-fixes).
- wifi: iwlwifi: mvm: revert gen2 TX A-MPDU size to 64 (git-fixes).
- wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() (git-fixes).
- wifi: mac80211: correctly parse Spatial Reuse Parameter Set element (git-fixes).
- wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects (git-fixes).
- wifi: rtl8xxxu: Fix the TX power of RTL8192CU, RTL8723AU (stable-fixes).
- wifi: rtlwifi: rtl8192de: Fix endianness issue in RX path (stable-fixes).
- wifi: rtlwifi: rtl8192de: Fix low speed with WPA3-SAE (stable-fixes).
- x86/mce: Dynamically size space for machine check records (bsc#1222241).
- x86/tsc: Trust initial offset in architectural TSC-adjust MSRs (bsc#1222015 bsc#1226962).
- xfs: make sure sb_fdblocks is non-negative (bsc#1225419).
- xhci: Fix failure to detect ring expansion need (git-fixes).
- xhci: Fix transfer ring expansion size calculation (git-fixes).
- xhci: Handle TD clearing for multiple streams case (git-fixes).
- xhci: Simplify event ring dequeue pointer update for port change events (git-fixes).
- xhci: Stop unnecessary tracking of free trbs in a ring (git-fixes).
- xhci: fix matching completion events with TDs (git-fixes).
- xhci: remove unused stream_id parameter from xhci_handle_halted_endpoint() (git-fixes).
- xhci: restre deleted trb fields for tracing (git-fixes).
- xhci: retry Stop Endpoint on buggy NEC controllers (git-fixes).
- xhci: simplify event ring dequeue tracking for transfer events (git-fixes).
- xhci: update event ring dequeue pointer position to controller correctly (git-fixes).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Container suse/sle-micro/rt-5.5:latest-2024-2394,SUSE-2024-2394,SUSE-SLE-Micro-5.5-2024-2394,SUSE-SLE-Module-Live-Patching-15-SP5-2024-2394,SUSE-SLE-Module-RT-15-SP5-2024-2394,openSUSE-SLE-15.5-2024-2394</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      <Description>Link for SUSE-SU-2024:2394-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:2394-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1156395</URL>
      <Description>SUSE Bug 1156395</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1190336</URL>
      <Description>SUSE Bug 1190336</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1191958</URL>
      <Description>SUSE Bug 1191958</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1193883</URL>
      <Description>SUSE Bug 1193883</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1194826</URL>
      <Description>SUSE Bug 1194826</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1195065</URL>
      <Description>SUSE Bug 1195065</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1195254</URL>
      <Description>SUSE Bug 1195254</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1195341</URL>
      <Description>SUSE Bug 1195341</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1195349</URL>
      <Description>SUSE Bug 1195349</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1195775</URL>
      <Description>SUSE Bug 1195775</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1196746</URL>
      <Description>SUSE Bug 1196746</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1197915</URL>
      <Description>SUSE Bug 1197915</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1198014</URL>
      <Description>SUSE Bug 1198014</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1199295</URL>
      <Description>SUSE Bug 1199295</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1202767</URL>
      <Description>SUSE Bug 1202767</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1202780</URL>
      <Description>SUSE Bug 1202780</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1205205</URL>
      <Description>SUSE Bug 1205205</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1207361</URL>
      <Description>SUSE Bug 1207361</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1217912</URL>
      <Description>SUSE Bug 1217912</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218148</URL>
      <Description>SUSE Bug 1218148</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218570</URL>
      <Description>SUSE Bug 1218570</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218820</URL>
      <Description>SUSE Bug 1218820</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1219224</URL>
      <Description>SUSE Bug 1219224</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1219633</URL>
      <Description>SUSE Bug 1219633</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1219847</URL>
      <Description>SUSE Bug 1219847</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1220368</URL>
      <Description>SUSE Bug 1220368</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1220812</URL>
      <Description>SUSE Bug 1220812</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1220958</URL>
      <Description>SUSE Bug 1220958</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221086</URL>
      <Description>SUSE Bug 1221086</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221282</URL>
      <Description>SUSE Bug 1221282</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221958</URL>
      <Description>SUSE Bug 1221958</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222015</URL>
      <Description>SUSE Bug 1222015</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222072</URL>
      <Description>SUSE Bug 1222072</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222080</URL>
      <Description>SUSE Bug 1222080</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222241</URL>
      <Description>SUSE Bug 1222241</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222254</URL>
      <Description>SUSE Bug 1222254</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222364</URL>
      <Description>SUSE Bug 1222364</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222893</URL>
      <Description>SUSE Bug 1222893</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223013</URL>
      <Description>SUSE Bug 1223013</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223018</URL>
      <Description>SUSE Bug 1223018</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223265</URL>
      <Description>SUSE Bug 1223265</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223384</URL>
      <Description>SUSE Bug 1223384</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223641</URL>
      <Description>SUSE Bug 1223641</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224020</URL>
      <Description>SUSE Bug 1224020</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224331</URL>
      <Description>SUSE Bug 1224331</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224488</URL>
      <Description>SUSE Bug 1224488</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224497</URL>
      <Description>SUSE Bug 1224497</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224498</URL>
      <Description>SUSE Bug 1224498</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224504</URL>
      <Description>SUSE Bug 1224504</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224520</URL>
      <Description>SUSE Bug 1224520</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224539</URL>
      <Description>SUSE Bug 1224539</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224540</URL>
      <Description>SUSE Bug 1224540</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224552</URL>
      <Description>SUSE Bug 1224552</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224583</URL>
      <Description>SUSE Bug 1224583</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224588</URL>
      <Description>SUSE Bug 1224588</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224602</URL>
      <Description>SUSE Bug 1224602</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224603</URL>
      <Description>SUSE Bug 1224603</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224605</URL>
      <Description>SUSE Bug 1224605</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224612</URL>
      <Description>SUSE Bug 1224612</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224614</URL>
      <Description>SUSE Bug 1224614</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224619</URL>
      <Description>SUSE Bug 1224619</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224661</URL>
      <Description>SUSE Bug 1224661</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224662</URL>
      <Description>SUSE Bug 1224662</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224670</URL>
      <Description>SUSE Bug 1224670</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224671</URL>
      <Description>SUSE Bug 1224671</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224674</URL>
      <Description>SUSE Bug 1224674</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224677</URL>
      <Description>SUSE Bug 1224677</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224679</URL>
      <Description>SUSE Bug 1224679</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224696</URL>
      <Description>SUSE Bug 1224696</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224703</URL>
      <Description>SUSE Bug 1224703</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224712</URL>
      <Description>SUSE Bug 1224712</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224716</URL>
      <Description>SUSE Bug 1224716</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224719</URL>
      <Description>SUSE Bug 1224719</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224735</URL>
      <Description>SUSE Bug 1224735</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224749</URL>
      <Description>SUSE Bug 1224749</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224764</URL>
      <Description>SUSE Bug 1224764</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224765</URL>
      <Description>SUSE Bug 1224765</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224766</URL>
      <Description>SUSE Bug 1224766</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224935</URL>
      <Description>SUSE Bug 1224935</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224946</URL>
      <Description>SUSE Bug 1224946</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224951</URL>
      <Description>SUSE Bug 1224951</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225050</URL>
      <Description>SUSE Bug 1225050</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225098</URL>
      <Description>SUSE Bug 1225098</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225105</URL>
      <Description>SUSE Bug 1225105</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225300</URL>
      <Description>SUSE Bug 1225300</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225389</URL>
      <Description>SUSE Bug 1225389</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225391</URL>
      <Description>SUSE Bug 1225391</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225419</URL>
      <Description>SUSE Bug 1225419</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225426</URL>
      <Description>SUSE Bug 1225426</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225448</URL>
      <Description>SUSE Bug 1225448</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225452</URL>
      <Description>SUSE Bug 1225452</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225467</URL>
      <Description>SUSE Bug 1225467</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225475</URL>
      <Description>SUSE Bug 1225475</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225484</URL>
      <Description>SUSE Bug 1225484</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225487</URL>
      <Description>SUSE Bug 1225487</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225514</URL>
      <Description>SUSE Bug 1225514</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225518</URL>
      <Description>SUSE Bug 1225518</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225535</URL>
      <Description>SUSE Bug 1225535</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225585</URL>
      <Description>SUSE Bug 1225585</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225602</URL>
      <Description>SUSE Bug 1225602</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225611</URL>
      <Description>SUSE Bug 1225611</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225681</URL>
      <Description>SUSE Bug 1225681</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225692</URL>
      <Description>SUSE Bug 1225692</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225698</URL>
      <Description>SUSE Bug 1225698</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225699</URL>
      <Description>SUSE Bug 1225699</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225704</URL>
      <Description>SUSE Bug 1225704</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225714</URL>
      <Description>SUSE Bug 1225714</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225726</URL>
      <Description>SUSE Bug 1225726</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225732</URL>
      <Description>SUSE Bug 1225732</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225737</URL>
      <Description>SUSE Bug 1225737</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225749</URL>
      <Description>SUSE Bug 1225749</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225758</URL>
      <Description>SUSE Bug 1225758</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225759</URL>
      <Description>SUSE Bug 1225759</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225760</URL>
      <Description>SUSE Bug 1225760</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225767</URL>
      <Description>SUSE Bug 1225767</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225770</URL>
      <Description>SUSE Bug 1225770</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225823</URL>
      <Description>SUSE Bug 1225823</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225834</URL>
      <Description>SUSE Bug 1225834</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225840</URL>
      <Description>SUSE Bug 1225840</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225866</URL>
      <Description>SUSE Bug 1225866</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225872</URL>
      <Description>SUSE Bug 1225872</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225894</URL>
      <Description>SUSE Bug 1225894</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226022</URL>
      <Description>SUSE Bug 1226022</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226131</URL>
      <Description>SUSE Bug 1226131</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226145</URL>
      <Description>SUSE Bug 1226145</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226149</URL>
      <Description>SUSE Bug 1226149</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226155</URL>
      <Description>SUSE Bug 1226155</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226211</URL>
      <Description>SUSE Bug 1226211</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226212</URL>
      <Description>SUSE Bug 1226212</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226226</URL>
      <Description>SUSE Bug 1226226</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226514</URL>
      <Description>SUSE Bug 1226514</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226520</URL>
      <Description>SUSE Bug 1226520</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226537</URL>
      <Description>SUSE Bug 1226537</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226538</URL>
      <Description>SUSE Bug 1226538</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226539</URL>
      <Description>SUSE Bug 1226539</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226550</URL>
      <Description>SUSE Bug 1226550</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226552</URL>
      <Description>SUSE Bug 1226552</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226553</URL>
      <Description>SUSE Bug 1226553</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226554</URL>
      <Description>SUSE Bug 1226554</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226556</URL>
      <Description>SUSE Bug 1226556</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226557</URL>
      <Description>SUSE Bug 1226557</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226558</URL>
      <Description>SUSE Bug 1226558</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226559</URL>
      <Description>SUSE Bug 1226559</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226561</URL>
      <Description>SUSE Bug 1226561</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226562</URL>
      <Description>SUSE Bug 1226562</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226563</URL>
      <Description>SUSE Bug 1226563</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226564</URL>
      <Description>SUSE Bug 1226564</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226566</URL>
      <Description>SUSE Bug 1226566</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226567</URL>
      <Description>SUSE Bug 1226567</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226569</URL>
      <Description>SUSE Bug 1226569</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226572</URL>
      <Description>SUSE Bug 1226572</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226575</URL>
      <Description>SUSE Bug 1226575</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226576</URL>
      <Description>SUSE Bug 1226576</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226577</URL>
      <Description>SUSE Bug 1226577</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226579</URL>
      <Description>SUSE Bug 1226579</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226580</URL>
      <Description>SUSE Bug 1226580</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226581</URL>
      <Description>SUSE Bug 1226581</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226582</URL>
      <Description>SUSE Bug 1226582</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226583</URL>
      <Description>SUSE Bug 1226583</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226585</URL>
      <Description>SUSE Bug 1226585</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226587</URL>
      <Description>SUSE Bug 1226587</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226588</URL>
      <Description>SUSE Bug 1226588</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226593</URL>
      <Description>SUSE Bug 1226593</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226595</URL>
      <Description>SUSE Bug 1226595</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226597</URL>
      <Description>SUSE Bug 1226597</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226601</URL>
      <Description>SUSE Bug 1226601</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226602</URL>
      <Description>SUSE Bug 1226602</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226603</URL>
      <Description>SUSE Bug 1226603</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226607</URL>
      <Description>SUSE Bug 1226607</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226610</URL>
      <Description>SUSE Bug 1226610</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226614</URL>
      <Description>SUSE Bug 1226614</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226616</URL>
      <Description>SUSE Bug 1226616</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226617</URL>
      <Description>SUSE Bug 1226617</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226618</URL>
      <Description>SUSE Bug 1226618</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226619</URL>
      <Description>SUSE Bug 1226619</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226621</URL>
      <Description>SUSE Bug 1226621</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226622</URL>
      <Description>SUSE Bug 1226622</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226624</URL>
      <Description>SUSE Bug 1226624</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226626</URL>
      <Description>SUSE Bug 1226626</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226628</URL>
      <Description>SUSE Bug 1226628</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226629</URL>
      <Description>SUSE Bug 1226629</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226632</URL>
      <Description>SUSE Bug 1226632</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226633</URL>
      <Description>SUSE Bug 1226633</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226634</URL>
      <Description>SUSE Bug 1226634</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226637</URL>
      <Description>SUSE Bug 1226637</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226643</URL>
      <Description>SUSE Bug 1226643</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226644</URL>
      <Description>SUSE Bug 1226644</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226645</URL>
      <Description>SUSE Bug 1226645</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226647</URL>
      <Description>SUSE Bug 1226647</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226650</URL>
      <Description>SUSE Bug 1226650</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226653</URL>
      <Description>SUSE Bug 1226653</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226657</URL>
      <Description>SUSE Bug 1226657</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226658</URL>
      <Description>SUSE Bug 1226658</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226669</URL>
      <Description>SUSE Bug 1226669</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226670</URL>
      <Description>SUSE Bug 1226670</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226672</URL>
      <Description>SUSE Bug 1226672</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226673</URL>
      <Description>SUSE Bug 1226673</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226674</URL>
      <Description>SUSE Bug 1226674</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226675</URL>
      <Description>SUSE Bug 1226675</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226678</URL>
      <Description>SUSE Bug 1226678</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226679</URL>
      <Description>SUSE Bug 1226679</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226683</URL>
      <Description>SUSE Bug 1226683</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226685</URL>
      <Description>SUSE Bug 1226685</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226686</URL>
      <Description>SUSE Bug 1226686</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226690</URL>
      <Description>SUSE Bug 1226690</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226691</URL>
      <Description>SUSE Bug 1226691</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226692</URL>
      <Description>SUSE Bug 1226692</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226693</URL>
      <Description>SUSE Bug 1226693</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226696</URL>
      <Description>SUSE Bug 1226696</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226697</URL>
      <Description>SUSE Bug 1226697</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226698</URL>
      <Description>SUSE Bug 1226698</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226699</URL>
      <Description>SUSE Bug 1226699</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226701</URL>
      <Description>SUSE Bug 1226701</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226702</URL>
      <Description>SUSE Bug 1226702</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226703</URL>
      <Description>SUSE Bug 1226703</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226704</URL>
      <Description>SUSE Bug 1226704</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226705</URL>
      <Description>SUSE Bug 1226705</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226706</URL>
      <Description>SUSE Bug 1226706</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226708</URL>
      <Description>SUSE Bug 1226708</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226709</URL>
      <Description>SUSE Bug 1226709</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226710</URL>
      <Description>SUSE Bug 1226710</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226711</URL>
      <Description>SUSE Bug 1226711</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226712</URL>
      <Description>SUSE Bug 1226712</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226713</URL>
      <Description>SUSE Bug 1226713</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226715</URL>
      <Description>SUSE Bug 1226715</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226716</URL>
      <Description>SUSE Bug 1226716</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226718</URL>
      <Description>SUSE Bug 1226718</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226719</URL>
      <Description>SUSE Bug 1226719</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226720</URL>
      <Description>SUSE Bug 1226720</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226721</URL>
      <Description>SUSE Bug 1226721</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226730</URL>
      <Description>SUSE Bug 1226730</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226732</URL>
      <Description>SUSE Bug 1226732</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226734</URL>
      <Description>SUSE Bug 1226734</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226735</URL>
      <Description>SUSE Bug 1226735</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226737</URL>
      <Description>SUSE Bug 1226737</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226738</URL>
      <Description>SUSE Bug 1226738</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226739</URL>
      <Description>SUSE Bug 1226739</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226740</URL>
      <Description>SUSE Bug 1226740</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226744</URL>
      <Description>SUSE Bug 1226744</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226746</URL>
      <Description>SUSE Bug 1226746</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226747</URL>
      <Description>SUSE Bug 1226747</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226749</URL>
      <Description>SUSE Bug 1226749</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226754</URL>
      <Description>SUSE Bug 1226754</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226762</URL>
      <Description>SUSE Bug 1226762</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226764</URL>
      <Description>SUSE Bug 1226764</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226767</URL>
      <Description>SUSE Bug 1226767</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226768</URL>
      <Description>SUSE Bug 1226768</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226769</URL>
      <Description>SUSE Bug 1226769</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226771</URL>
      <Description>SUSE Bug 1226771</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226774</URL>
      <Description>SUSE Bug 1226774</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226777</URL>
      <Description>SUSE Bug 1226777</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226780</URL>
      <Description>SUSE Bug 1226780</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226781</URL>
      <Description>SUSE Bug 1226781</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226785</URL>
      <Description>SUSE Bug 1226785</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226786</URL>
      <Description>SUSE Bug 1226786</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226789</URL>
      <Description>SUSE Bug 1226789</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226791</URL>
      <Description>SUSE Bug 1226791</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226839</URL>
      <Description>SUSE Bug 1226839</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226840</URL>
      <Description>SUSE Bug 1226840</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226841</URL>
      <Description>SUSE Bug 1226841</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226842</URL>
      <Description>SUSE Bug 1226842</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226848</URL>
      <Description>SUSE Bug 1226848</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226852</URL>
      <Description>SUSE Bug 1226852</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226857</URL>
      <Description>SUSE Bug 1226857</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226861</URL>
      <Description>SUSE Bug 1226861</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226863</URL>
      <Description>SUSE Bug 1226863</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226864</URL>
      <Description>SUSE Bug 1226864</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226867</URL>
      <Description>SUSE Bug 1226867</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226868</URL>
      <Description>SUSE Bug 1226868</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226876</URL>
      <Description>SUSE Bug 1226876</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226878</URL>
      <Description>SUSE Bug 1226878</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226883</URL>
      <Description>SUSE Bug 1226883</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226886</URL>
      <Description>SUSE Bug 1226886</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226890</URL>
      <Description>SUSE Bug 1226890</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226891</URL>
      <Description>SUSE Bug 1226891</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226895</URL>
      <Description>SUSE Bug 1226895</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226908</URL>
      <Description>SUSE Bug 1226908</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226915</URL>
      <Description>SUSE Bug 1226915</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226928</URL>
      <Description>SUSE Bug 1226928</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226948</URL>
      <Description>SUSE Bug 1226948</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226949</URL>
      <Description>SUSE Bug 1226949</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226950</URL>
      <Description>SUSE Bug 1226950</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226953</URL>
      <Description>SUSE Bug 1226953</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226962</URL>
      <Description>SUSE Bug 1226962</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226976</URL>
      <Description>SUSE Bug 1226976</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226992</URL>
      <Description>SUSE Bug 1226992</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226994</URL>
      <Description>SUSE Bug 1226994</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226996</URL>
      <Description>SUSE Bug 1226996</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227066</URL>
      <Description>SUSE Bug 1227066</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227096</URL>
      <Description>SUSE Bug 1227096</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227101</URL>
      <Description>SUSE Bug 1227101</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227103</URL>
      <Description>SUSE Bug 1227103</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227274</URL>
      <Description>SUSE Bug 1227274</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-4439/</URL>
      <Description>SUSE CVE CVE-2021-4439 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47089/</URL>
      <Description>SUSE CVE CVE-2021-47089 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47432/</URL>
      <Description>SUSE CVE CVE-2021-47432 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47515/</URL>
      <Description>SUSE CVE CVE-2021-47515 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47534/</URL>
      <Description>SUSE CVE CVE-2021-47534 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47538/</URL>
      <Description>SUSE CVE CVE-2021-47538 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47539/</URL>
      <Description>SUSE CVE CVE-2021-47539 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47555/</URL>
      <Description>SUSE CVE CVE-2021-47555 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47566/</URL>
      <Description>SUSE CVE CVE-2021-47566 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47571/</URL>
      <Description>SUSE CVE CVE-2021-47571 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47572/</URL>
      <Description>SUSE CVE CVE-2021-47572 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47576/</URL>
      <Description>SUSE CVE CVE-2021-47576 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47577/</URL>
      <Description>SUSE CVE CVE-2021-47577 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47578/</URL>
      <Description>SUSE CVE CVE-2021-47578 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47580/</URL>
      <Description>SUSE CVE CVE-2021-47580 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47582/</URL>
      <Description>SUSE CVE CVE-2021-47582 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47583/</URL>
      <Description>SUSE CVE CVE-2021-47583 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47584/</URL>
      <Description>SUSE CVE CVE-2021-47584 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47585/</URL>
      <Description>SUSE CVE CVE-2021-47585 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47586/</URL>
      <Description>SUSE CVE CVE-2021-47586 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47587/</URL>
      <Description>SUSE CVE CVE-2021-47587 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47589/</URL>
      <Description>SUSE CVE CVE-2021-47589 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47592/</URL>
      <Description>SUSE CVE CVE-2021-47592 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47595/</URL>
      <Description>SUSE CVE CVE-2021-47595 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47596/</URL>
      <Description>SUSE CVE CVE-2021-47596 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47597/</URL>
      <Description>SUSE CVE CVE-2021-47597 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47600/</URL>
      <Description>SUSE CVE CVE-2021-47600 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47601/</URL>
      <Description>SUSE CVE CVE-2021-47601 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47602/</URL>
      <Description>SUSE CVE CVE-2021-47602 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47603/</URL>
      <Description>SUSE CVE CVE-2021-47603 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47604/</URL>
      <Description>SUSE CVE CVE-2021-47604 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47605/</URL>
      <Description>SUSE CVE CVE-2021-47605 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47607/</URL>
      <Description>SUSE CVE CVE-2021-47607 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47608/</URL>
      <Description>SUSE CVE CVE-2021-47608 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47609/</URL>
      <Description>SUSE CVE CVE-2021-47609 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47610/</URL>
      <Description>SUSE CVE CVE-2021-47610 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47611/</URL>
      <Description>SUSE CVE CVE-2021-47611 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47612/</URL>
      <Description>SUSE CVE CVE-2021-47612 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47614/</URL>
      <Description>SUSE CVE CVE-2021-47614 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47615/</URL>
      <Description>SUSE CVE CVE-2021-47615 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47616/</URL>
      <Description>SUSE CVE CVE-2021-47616 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47617/</URL>
      <Description>SUSE CVE CVE-2021-47617 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47618/</URL>
      <Description>SUSE CVE CVE-2021-47618 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47619/</URL>
      <Description>SUSE CVE CVE-2021-47619 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47620/</URL>
      <Description>SUSE CVE CVE-2021-47620 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48711/</URL>
      <Description>SUSE CVE CVE-2022-48711 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48712/</URL>
      <Description>SUSE CVE CVE-2022-48712 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48713/</URL>
      <Description>SUSE CVE CVE-2022-48713 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48714/</URL>
      <Description>SUSE CVE CVE-2022-48714 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48715/</URL>
      <Description>SUSE CVE CVE-2022-48715 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48716/</URL>
      <Description>SUSE CVE CVE-2022-48716 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48717/</URL>
      <Description>SUSE CVE CVE-2022-48717 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48718/</URL>
      <Description>SUSE CVE CVE-2022-48718 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48720/</URL>
      <Description>SUSE CVE CVE-2022-48720 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48721/</URL>
      <Description>SUSE CVE CVE-2022-48721 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48722/</URL>
      <Description>SUSE CVE CVE-2022-48722 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48723/</URL>
      <Description>SUSE CVE CVE-2022-48723 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48724/</URL>
      <Description>SUSE CVE CVE-2022-48724 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48725/</URL>
      <Description>SUSE CVE CVE-2022-48725 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48726/</URL>
      <Description>SUSE CVE CVE-2022-48726 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48727/</URL>
      <Description>SUSE CVE CVE-2022-48727 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48728/</URL>
      <Description>SUSE CVE CVE-2022-48728 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48729/</URL>
      <Description>SUSE CVE CVE-2022-48729 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48730/</URL>
      <Description>SUSE CVE CVE-2022-48730 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48732/</URL>
      <Description>SUSE CVE CVE-2022-48732 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48733/</URL>
      <Description>SUSE CVE CVE-2022-48733 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48734/</URL>
      <Description>SUSE CVE CVE-2022-48734 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48735/</URL>
      <Description>SUSE CVE CVE-2022-48735 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48736/</URL>
      <Description>SUSE CVE CVE-2022-48736 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48737/</URL>
      <Description>SUSE CVE CVE-2022-48737 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48738/</URL>
      <Description>SUSE CVE CVE-2022-48738 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48739/</URL>
      <Description>SUSE CVE CVE-2022-48739 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48740/</URL>
      <Description>SUSE CVE CVE-2022-48740 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48743/</URL>
      <Description>SUSE CVE CVE-2022-48743 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48744/</URL>
      <Description>SUSE CVE CVE-2022-48744 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48745/</URL>
      <Description>SUSE CVE CVE-2022-48745 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48746/</URL>
      <Description>SUSE CVE CVE-2022-48746 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48747/</URL>
      <Description>SUSE CVE CVE-2022-48747 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48748/</URL>
      <Description>SUSE CVE CVE-2022-48748 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48749/</URL>
      <Description>SUSE CVE CVE-2022-48749 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48751/</URL>
      <Description>SUSE CVE CVE-2022-48751 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48752/</URL>
      <Description>SUSE CVE CVE-2022-48752 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48753/</URL>
      <Description>SUSE CVE CVE-2022-48753 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48754/</URL>
      <Description>SUSE CVE CVE-2022-48754 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48755/</URL>
      <Description>SUSE CVE CVE-2022-48755 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48756/</URL>
      <Description>SUSE CVE CVE-2022-48756 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48758/</URL>
      <Description>SUSE CVE CVE-2022-48758 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48759/</URL>
      <Description>SUSE CVE CVE-2022-48759 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48760/</URL>
      <Description>SUSE CVE CVE-2022-48760 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48761/</URL>
      <Description>SUSE CVE CVE-2022-48761 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48763/</URL>
      <Description>SUSE CVE CVE-2022-48763 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48765/</URL>
      <Description>SUSE CVE CVE-2022-48765 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48766/</URL>
      <Description>SUSE CVE CVE-2022-48766 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48767/</URL>
      <Description>SUSE CVE CVE-2022-48767 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48768/</URL>
      <Description>SUSE CVE CVE-2022-48768 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48769/</URL>
      <Description>SUSE CVE CVE-2022-48769 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48770/</URL>
      <Description>SUSE CVE CVE-2022-48770 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48771/</URL>
      <Description>SUSE CVE CVE-2022-48771 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48772/</URL>
      <Description>SUSE CVE CVE-2022-48772 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-24023/</URL>
      <Description>SUSE CVE CVE-2023-24023 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52622/</URL>
      <Description>SUSE CVE CVE-2023-52622 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52658/</URL>
      <Description>SUSE CVE CVE-2023-52658 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52667/</URL>
      <Description>SUSE CVE CVE-2023-52667 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52670/</URL>
      <Description>SUSE CVE CVE-2023-52670 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52672/</URL>
      <Description>SUSE CVE CVE-2023-52672 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52675/</URL>
      <Description>SUSE CVE CVE-2023-52675 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52735/</URL>
      <Description>SUSE CVE CVE-2023-52735 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52737/</URL>
      <Description>SUSE CVE CVE-2023-52737 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52752/</URL>
      <Description>SUSE CVE CVE-2023-52752 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52766/</URL>
      <Description>SUSE CVE CVE-2023-52766 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52784/</URL>
      <Description>SUSE CVE CVE-2023-52784 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52787/</URL>
      <Description>SUSE CVE CVE-2023-52787 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52800/</URL>
      <Description>SUSE CVE CVE-2023-52800 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52835/</URL>
      <Description>SUSE CVE CVE-2023-52835 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52837/</URL>
      <Description>SUSE CVE CVE-2023-52837 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52843/</URL>
      <Description>SUSE CVE CVE-2023-52843 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52845/</URL>
      <Description>SUSE CVE CVE-2023-52845 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52846/</URL>
      <Description>SUSE CVE CVE-2023-52846 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52869/</URL>
      <Description>SUSE CVE CVE-2023-52869 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52881/</URL>
      <Description>SUSE CVE CVE-2023-52881 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52882/</URL>
      <Description>SUSE CVE CVE-2023-52882 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52884/</URL>
      <Description>SUSE CVE CVE-2023-52884 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26625/</URL>
      <Description>SUSE CVE CVE-2024-26625 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26644/</URL>
      <Description>SUSE CVE CVE-2024-26644 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26720/</URL>
      <Description>SUSE CVE CVE-2024-26720 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26842/</URL>
      <Description>SUSE CVE CVE-2024-26842 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26845/</URL>
      <Description>SUSE CVE CVE-2024-26845 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26923/</URL>
      <Description>SUSE CVE CVE-2024-26923 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26973/</URL>
      <Description>SUSE CVE CVE-2024-26973 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-27432/</URL>
      <Description>SUSE CVE CVE-2024-27432 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-33619/</URL>
      <Description>SUSE CVE CVE-2024-33619 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35247/</URL>
      <Description>SUSE CVE CVE-2024-35247 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35789/</URL>
      <Description>SUSE CVE CVE-2024-35789 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35790/</URL>
      <Description>SUSE CVE CVE-2024-35790 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35807/</URL>
      <Description>SUSE CVE CVE-2024-35807 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35814/</URL>
      <Description>SUSE CVE CVE-2024-35814 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35835/</URL>
      <Description>SUSE CVE CVE-2024-35835 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35848/</URL>
      <Description>SUSE CVE CVE-2024-35848 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35857/</URL>
      <Description>SUSE CVE CVE-2024-35857 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35861/</URL>
      <Description>SUSE CVE CVE-2024-35861 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35862/</URL>
      <Description>SUSE CVE CVE-2024-35862 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35864/</URL>
      <Description>SUSE CVE CVE-2024-35864 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35869/</URL>
      <Description>SUSE CVE CVE-2024-35869 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35878/</URL>
      <Description>SUSE CVE CVE-2024-35878 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35884/</URL>
      <Description>SUSE CVE CVE-2024-35884 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35886/</URL>
      <Description>SUSE CVE CVE-2024-35886 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35896/</URL>
      <Description>SUSE CVE CVE-2024-35896 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35898/</URL>
      <Description>SUSE CVE CVE-2024-35898 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35900/</URL>
      <Description>SUSE CVE CVE-2024-35900 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35905/</URL>
      <Description>SUSE CVE CVE-2024-35905 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35925/</URL>
      <Description>SUSE CVE CVE-2024-35925 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35950/</URL>
      <Description>SUSE CVE CVE-2024-35950 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35956/</URL>
      <Description>SUSE CVE CVE-2024-35956 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35958/</URL>
      <Description>SUSE CVE CVE-2024-35958 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35960/</URL>
      <Description>SUSE CVE CVE-2024-35960 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35962/</URL>
      <Description>SUSE CVE CVE-2024-35962 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35997/</URL>
      <Description>SUSE CVE CVE-2024-35997 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36005/</URL>
      <Description>SUSE CVE CVE-2024-36005 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36008/</URL>
      <Description>SUSE CVE CVE-2024-36008 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36017/</URL>
      <Description>SUSE CVE CVE-2024-36017 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36020/</URL>
      <Description>SUSE CVE CVE-2024-36020 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36021/</URL>
      <Description>SUSE CVE CVE-2024-36021 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36025/</URL>
      <Description>SUSE CVE CVE-2024-36025 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36477/</URL>
      <Description>SUSE CVE CVE-2024-36477 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36478/</URL>
      <Description>SUSE CVE CVE-2024-36478 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36479/</URL>
      <Description>SUSE CVE CVE-2024-36479 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36890/</URL>
      <Description>SUSE CVE CVE-2024-36890 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36894/</URL>
      <Description>SUSE CVE CVE-2024-36894 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36899/</URL>
      <Description>SUSE CVE CVE-2024-36899 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36900/</URL>
      <Description>SUSE CVE CVE-2024-36900 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36904/</URL>
      <Description>SUSE CVE CVE-2024-36904 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36915/</URL>
      <Description>SUSE CVE CVE-2024-36915 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36916/</URL>
      <Description>SUSE CVE CVE-2024-36916 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36917/</URL>
      <Description>SUSE CVE CVE-2024-36917 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36919/</URL>
      <Description>SUSE CVE CVE-2024-36919 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36934/</URL>
      <Description>SUSE CVE CVE-2024-36934 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36937/</URL>
      <Description>SUSE CVE CVE-2024-36937 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36940/</URL>
      <Description>SUSE CVE CVE-2024-36940 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36945/</URL>
      <Description>SUSE CVE CVE-2024-36945 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36949/</URL>
      <Description>SUSE CVE CVE-2024-36949 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36960/</URL>
      <Description>SUSE CVE CVE-2024-36960 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36964/</URL>
      <Description>SUSE CVE CVE-2024-36964 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36965/</URL>
      <Description>SUSE CVE CVE-2024-36965 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36967/</URL>
      <Description>SUSE CVE CVE-2024-36967 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36969/</URL>
      <Description>SUSE CVE CVE-2024-36969 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36971/</URL>
      <Description>SUSE CVE CVE-2024-36971 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36975/</URL>
      <Description>SUSE CVE CVE-2024-36975 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36978/</URL>
      <Description>SUSE CVE CVE-2024-36978 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-37021/</URL>
      <Description>SUSE CVE CVE-2024-37021 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-37078/</URL>
      <Description>SUSE CVE CVE-2024-37078 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-37354/</URL>
      <Description>SUSE CVE CVE-2024-37354 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38381/</URL>
      <Description>SUSE CVE CVE-2024-38381 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38388/</URL>
      <Description>SUSE CVE CVE-2024-38388 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38390/</URL>
      <Description>SUSE CVE CVE-2024-38390 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38540/</URL>
      <Description>SUSE CVE CVE-2024-38540 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38541/</URL>
      <Description>SUSE CVE CVE-2024-38541 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38544/</URL>
      <Description>SUSE CVE CVE-2024-38544 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38545/</URL>
      <Description>SUSE CVE CVE-2024-38545 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38546/</URL>
      <Description>SUSE CVE CVE-2024-38546 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38547/</URL>
      <Description>SUSE CVE CVE-2024-38547 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38548/</URL>
      <Description>SUSE CVE CVE-2024-38548 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38549/</URL>
      <Description>SUSE CVE CVE-2024-38549 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38550/</URL>
      <Description>SUSE CVE CVE-2024-38550 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38552/</URL>
      <Description>SUSE CVE CVE-2024-38552 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38553/</URL>
      <Description>SUSE CVE CVE-2024-38553 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38555/</URL>
      <Description>SUSE CVE CVE-2024-38555 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38556/</URL>
      <Description>SUSE CVE CVE-2024-38556 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38557/</URL>
      <Description>SUSE CVE CVE-2024-38557 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38559/</URL>
      <Description>SUSE CVE CVE-2024-38559 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38560/</URL>
      <Description>SUSE CVE CVE-2024-38560 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38564/</URL>
      <Description>SUSE CVE CVE-2024-38564 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38565/</URL>
      <Description>SUSE CVE CVE-2024-38565 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38567/</URL>
      <Description>SUSE CVE CVE-2024-38567 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38568/</URL>
      <Description>SUSE CVE CVE-2024-38568 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38571/</URL>
      <Description>SUSE CVE CVE-2024-38571 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38573/</URL>
      <Description>SUSE CVE CVE-2024-38573 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38578/</URL>
      <Description>SUSE CVE CVE-2024-38578 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38579/</URL>
      <Description>SUSE CVE CVE-2024-38579 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38580/</URL>
      <Description>SUSE CVE CVE-2024-38580 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38581/</URL>
      <Description>SUSE CVE CVE-2024-38581 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38582/</URL>
      <Description>SUSE CVE CVE-2024-38582 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38583/</URL>
      <Description>SUSE CVE CVE-2024-38583 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38587/</URL>
      <Description>SUSE CVE CVE-2024-38587 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38590/</URL>
      <Description>SUSE CVE CVE-2024-38590 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38591/</URL>
      <Description>SUSE CVE CVE-2024-38591 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38594/</URL>
      <Description>SUSE CVE CVE-2024-38594 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38597/</URL>
      <Description>SUSE CVE CVE-2024-38597 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38599/</URL>
      <Description>SUSE CVE CVE-2024-38599 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38600/</URL>
      <Description>SUSE CVE CVE-2024-38600 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38601/</URL>
      <Description>SUSE CVE CVE-2024-38601 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38603/</URL>
      <Description>SUSE CVE CVE-2024-38603 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38605/</URL>
      <Description>SUSE CVE CVE-2024-38605 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38608/</URL>
      <Description>SUSE CVE CVE-2024-38608 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38616/</URL>
      <Description>SUSE CVE CVE-2024-38616 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38618/</URL>
      <Description>SUSE CVE CVE-2024-38618 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38619/</URL>
      <Description>SUSE CVE CVE-2024-38619 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38621/</URL>
      <Description>SUSE CVE CVE-2024-38621 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38627/</URL>
      <Description>SUSE CVE CVE-2024-38627 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38630/</URL>
      <Description>SUSE CVE CVE-2024-38630 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38633/</URL>
      <Description>SUSE CVE CVE-2024-38633 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38634/</URL>
      <Description>SUSE CVE CVE-2024-38634 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38635/</URL>
      <Description>SUSE CVE CVE-2024-38635 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38659/</URL>
      <Description>SUSE CVE CVE-2024-38659 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38661/</URL>
      <Description>SUSE CVE CVE-2024-38661 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38780/</URL>
      <Description>SUSE CVE CVE-2024-38780 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-39301/</URL>
      <Description>SUSE CVE CVE-2024-39301 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-39468/</URL>
      <Description>SUSE CVE CVE-2024-39468 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-39469/</URL>
      <Description>SUSE CVE CVE-2024-39469 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-39471/</URL>
      <Description>SUSE CVE CVE-2024-39471 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Container suse/sle-micro/rt-5.5:latest">
      <Branch Type="Product Name" Name="Container suse/sle-micro/rt-5.5:latest">
        <FullProductName ProductID="Container suse/sle-micro/rt-5.5:latest">Container suse/sle-micro/rt-5.5:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Live Patching 15 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Live Patching 15 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15 SP5" CPE="cpe:/o:suse:sle-module-live-patching:15:sp5">SUSE Linux Enterprise Live Patching 15 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Micro 5.5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Micro 5.5">
        <FullProductName ProductID="SUSE Linux Enterprise Micro 5.5" CPE="cpe:/o:suse:sle-micro:5.5">SUSE Linux Enterprise Micro 5.5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Real Time Module 15 SP5">
      <Branch Type="Product Name" Name="SUSE Real Time Module 15 SP5">
        <FullProductName ProductID="SUSE Real Time Module 15 SP5" CPE="cpe:/o:suse:sle-module-rt:15:sp5">SUSE Real Time Module 15 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.5">
      <Branch Type="Product Name" Name="openSUSE Leap 15.5">
        <FullProductName ProductID="openSUSE Leap 15.5" CPE="cpe:/o:opensuse:leap:15.5">openSUSE Leap 15.5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-5.14.21-150500.13.61.1">
      <FullProductName ProductID="kernel-rt-5.14.21-150500.13.61.1">kernel-rt-5.14.21-150500.13.61.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cluster-md-kmp-rt-5.14.21-150500.13.61.1">
      <FullProductName ProductID="cluster-md-kmp-rt-5.14.21-150500.13.61.1">cluster-md-kmp-rt-5.14.21-150500.13.61.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dlm-kmp-rt-5.14.21-150500.13.61.1">
      <FullProductName ProductID="dlm-kmp-rt-5.14.21-150500.13.61.1">dlm-kmp-rt-5.14.21-150500.13.61.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gfs2-kmp-rt-5.14.21-150500.13.61.1">
      <FullProductName ProductID="gfs2-kmp-rt-5.14.21-150500.13.61.1">gfs2-kmp-rt-5.14.21-150500.13.61.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-rt-5.14.21-150500.13.61.1">
      <FullProductName ProductID="kernel-devel-rt-5.14.21-150500.13.61.1">kernel-devel-rt-5.14.21-150500.13.61.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1">
      <FullProductName ProductID="kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1">kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-devel-5.14.21-150500.13.61.1">
      <FullProductName ProductID="kernel-rt-devel-5.14.21-150500.13.61.1">kernel-rt-devel-5.14.21-150500.13.61.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-extra-5.14.21-150500.13.61.1">
      <FullProductName ProductID="kernel-rt-extra-5.14.21-150500.13.61.1">kernel-rt-extra-5.14.21-150500.13.61.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-livepatch-5.14.21-150500.13.61.1">
      <FullProductName ProductID="kernel-rt-livepatch-5.14.21-150500.13.61.1">kernel-rt-livepatch-5.14.21-150500.13.61.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-livepatch-devel-5.14.21-150500.13.61.1">
      <FullProductName ProductID="kernel-rt-livepatch-devel-5.14.21-150500.13.61.1">kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-optional-5.14.21-150500.13.61.1">
      <FullProductName ProductID="kernel-rt-optional-5.14.21-150500.13.61.1">kernel-rt-optional-5.14.21-150500.13.61.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-vdso-5.14.21-150500.13.61.1">
      <FullProductName ProductID="kernel-rt-vdso-5.14.21-150500.13.61.1">kernel-rt-vdso-5.14.21-150500.13.61.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt_debug-5.14.21-150500.13.61.1">
      <FullProductName ProductID="kernel-rt_debug-5.14.21-150500.13.61.1">kernel-rt_debug-5.14.21-150500.13.61.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt_debug-devel-5.14.21-150500.13.61.1">
      <FullProductName ProductID="kernel-rt_debug-devel-5.14.21-150500.13.61.1">kernel-rt_debug-devel-5.14.21-150500.13.61.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1">
      <FullProductName ProductID="kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1">kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt_debug-vdso-5.14.21-150500.13.61.1">
      <FullProductName ProductID="kernel-rt_debug-vdso-5.14.21-150500.13.61.1">kernel-rt_debug-vdso-5.14.21-150500.13.61.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-rt-5.14.21-150500.13.61.1">
      <FullProductName ProductID="kernel-source-rt-5.14.21-150500.13.61.1">kernel-source-rt-5.14.21-150500.13.61.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-rt-5.14.21-150500.13.61.1">
      <FullProductName ProductID="kernel-syms-rt-5.14.21-150500.13.61.1">kernel-syms-rt-5.14.21-150500.13.61.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kselftests-kmp-rt-5.14.21-150500.13.61.1">
      <FullProductName ProductID="kselftests-kmp-rt-5.14.21-150500.13.61.1">kselftests-kmp-rt-5.14.21-150500.13.61.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ocfs2-kmp-rt-5.14.21-150500.13.61.1">
      <FullProductName ProductID="ocfs2-kmp-rt-5.14.21-150500.13.61.1">ocfs2-kmp-rt-5.14.21-150500.13.61.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="reiserfs-kmp-rt-5.14.21-150500.13.61.1">
      <FullProductName ProductID="reiserfs-kmp-rt-5.14.21-150500.13.61.1">reiserfs-kmp-rt-5.14.21-150500.13.61.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-rt-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sle-micro/rt-5.5:latest">
      <FullProductName ProductID="Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1">kernel-rt-5.14.21-150500.13.61.1 as a component of Container suse/sle-micro/rt-5.5:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1">kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.5">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1">kernel-rt-5.14.21-150500.13.61.1 as a component of SUSE Linux Enterprise Micro 5.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-rt-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.5">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1">kernel-source-rt-5.14.21-150500.13.61.1 as a component of SUSE Linux Enterprise Micro 5.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-rt-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP5">
      <FullProductName ProductID="SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1">cluster-md-kmp-rt-5.14.21-150500.13.61.1 as a component of SUSE Real Time Module 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-rt-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP5">
      <FullProductName ProductID="SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1">dlm-kmp-rt-5.14.21-150500.13.61.1 as a component of SUSE Real Time Module 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-rt-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP5">
      <FullProductName ProductID="SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1">gfs2-kmp-rt-5.14.21-150500.13.61.1 as a component of SUSE Real Time Module 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-rt-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP5">
      <FullProductName ProductID="SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1">kernel-devel-rt-5.14.21-150500.13.61.1 as a component of SUSE Real Time Module 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP5">
      <FullProductName ProductID="SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1">kernel-rt-5.14.21-150500.13.61.1 as a component of SUSE Real Time Module 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt-devel-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP5">
      <FullProductName ProductID="SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1">kernel-rt-devel-5.14.21-150500.13.61.1 as a component of SUSE Real Time Module 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt-vdso-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP5">
      <FullProductName ProductID="SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1">kernel-rt-vdso-5.14.21-150500.13.61.1 as a component of SUSE Real Time Module 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt_debug-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP5">
      <FullProductName ProductID="SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1">kernel-rt_debug-5.14.21-150500.13.61.1 as a component of SUSE Real Time Module 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt_debug-devel-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP5">
      <FullProductName ProductID="SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1">kernel-rt_debug-devel-5.14.21-150500.13.61.1 as a component of SUSE Real Time Module 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt_debug-vdso-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP5">
      <FullProductName ProductID="SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1">kernel-rt_debug-vdso-5.14.21-150500.13.61.1 as a component of SUSE Real Time Module 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-rt-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP5">
      <FullProductName ProductID="SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1">kernel-source-rt-5.14.21-150500.13.61.1 as a component of SUSE Real Time Module 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-rt-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP5">
      <FullProductName ProductID="SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1">kernel-syms-rt-5.14.21-150500.13.61.1 as a component of SUSE Real Time Module 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-rt-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP5">
      <FullProductName ProductID="SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1">ocfs2-kmp-rt-5.14.21-150500.13.61.1 as a component of SUSE Real Time Module 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-rt-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1">cluster-md-kmp-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-rt-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1">dlm-kmp-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-rt-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1">gfs2-kmp-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-rt-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1">kernel-devel-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1">kernel-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt-devel-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1">kernel-rt-devel-5.14.21-150500.13.61.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt-extra-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1">kernel-rt-extra-5.14.21-150500.13.61.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt-livepatch-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1">kernel-rt-livepatch-5.14.21-150500.13.61.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt-livepatch-devel-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1">kernel-rt-livepatch-devel-5.14.21-150500.13.61.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt-optional-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1">kernel-rt-optional-5.14.21-150500.13.61.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt-vdso-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1">kernel-rt-vdso-5.14.21-150500.13.61.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt_debug-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1">kernel-rt_debug-5.14.21-150500.13.61.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt_debug-devel-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1">kernel-rt_debug-devel-5.14.21-150500.13.61.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1">kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt_debug-vdso-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1">kernel-rt_debug-vdso-5.14.21-150500.13.61.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-rt-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1">kernel-source-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-rt-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1">kernel-syms-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kselftests-kmp-rt-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1">kselftests-kmp-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-rt-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1">ocfs2-kmp-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="reiserfs-kmp-rt-5.14.21-150500.13.61.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1">reiserfs-kmp-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

isdn: cpai: check ctr-&gt;cnr to avoid array index out of bound

The cmtp_add_connection() would add a cmtp session to a controller
and run a kernel thread to process cmtp.

	__module_get(THIS_MODULE);
	session-&gt;task = kthread_run(cmtp_session, session, "kcmtpd_ctr_%d",
								session-&gt;num);

During this process, the kernel thread would call detach_capi_ctr()
to detach a register controller. if the controller
was not attached yet, detach_capi_ctr() would
trigger an array-index-out-bounds bug.

[   46.866069][ T6479] UBSAN: array-index-out-of-bounds in
drivers/isdn/capi/kcapi.c:483:21
[   46.867196][ T6479] index -1 is out of range for type 'capi_ctr *[32]'
[   46.867982][ T6479] CPU: 1 PID: 6479 Comm: kcmtpd_ctr_0 Not tainted
5.15.0-rc2+ #8
[   46.869002][ T6479] Hardware name: QEMU Standard PC (i440FX + PIIX,
1996), BIOS 1.14.0-2 04/01/2014
[   46.870107][ T6479] Call Trace:
[   46.870473][ T6479]  dump_stack_lvl+0x57/0x7d
[   46.870974][ T6479]  ubsan_epilogue+0x5/0x40
[   46.871458][ T6479]  __ubsan_handle_out_of_bounds.cold+0x43/0x48
[   46.872135][ T6479]  detach_capi_ctr+0x64/0xc0
[   46.872639][ T6479]  cmtp_session+0x5c8/0x5d0
[   46.873131][ T6479]  ? __init_waitqueue_head+0x60/0x60
[   46.873712][ T6479]  ? cmtp_add_msgpart+0x120/0x120
[   46.874256][ T6479]  kthread+0x147/0x170
[   46.874709][ T6479]  ? set_kthread_struct+0x40/0x40
[   46.875248][ T6479]  ret_from_fork+0x1f/0x30
[   46.875773][ T6479]</Note>
    </Notes>
    <CVE>CVE-2021-4439</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-4439.html</URL>
        <Description>CVE-2021-4439</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226670</URL>
        <Description>SUSE Bug 1226670</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

kfence: fix memory leak when cat kfence objects

Hulk robot reported a kmemleak problem:

    unreferenced object 0xffff93d1d8cc02e8 (size 248):
      comm "cat", pid 23327, jiffies 4624670141 (age 495992.217s)
      hex dump (first 32 bytes):
        00 40 85 19 d4 93 ff ff 00 10 00 00 00 00 00 00  .@..............
        00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
      backtrace:
         seq_open+0x2a/0x80
         full_proxy_open+0x167/0x1e0
         do_dentry_open+0x1e1/0x3a0
         path_openat+0x961/0xa20
         do_filp_open+0xae/0x120
         do_sys_openat2+0x216/0x2f0
         do_sys_open+0x57/0x80
         do_syscall_64+0x33/0x40
         entry_SYSCALL_64_after_hwframe+0x44/0xa9
    unreferenced object 0xffff93d419854000 (size 4096):
      comm "cat", pid 23327, jiffies 4624670141 (age 495992.217s)
      hex dump (first 32 bytes):
        6b 66 65 6e 63 65 2d 23 32 35 30 3a 20 30 78 30  kfence-#250: 0x0
        30 30 30 30 30 30 30 37 35 34 62 64 61 31 32 2d  0000000754bda12-
      backtrace:
         seq_read_iter+0x313/0x440
         seq_read+0x14b/0x1a0
         full_proxy_read+0x56/0x80
         vfs_read+0xa5/0x1b0
         ksys_read+0xa0/0xf0
         do_syscall_64+0x33/0x40
         entry_SYSCALL_64_after_hwframe+0x44/0xa9

I find that we can easily reproduce this problem with the following
commands:

	cat /sys/kernel/debug/kfence/objects
	echo scan &gt; /sys/kernel/debug/kmemleak
	cat /sys/kernel/debug/kmemleak

The leaked memory is allocated in the stack below:

    do_syscall_64
      do_sys_open
        do_dentry_open
          full_proxy_open
            seq_open            ---&gt; alloc seq_file
      vfs_read
        full_proxy_read
          seq_read
            seq_read_iter
              traverse          ---&gt; alloc seq_buf

And it should have been released in the following process:

    do_syscall_64
      syscall_exit_to_user_mode
        exit_to_user_mode_prepare
          task_work_run
            ____fput
              __fput
                full_proxy_release  ---&gt; free here

However, the release function corresponding to file_operations is not
implemented in kfence.  As a result, a memory leak occurs.  Therefore,
the solution to this problem is to implement the corresponding release
function.</Note>
    </Notes>
    <CVE>CVE-2021-47089</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47089.html</URL>
        <Description>CVE-2021-47089</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1220958</URL>
        <Description>SUSE Bug 1220958</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

lib/generic-radix-tree.c: Don't overflow in peek()

When we started spreading new inode numbers throughout most of the 64
bit inode space, that triggered some corner case bugs, in particular
some integer overflows related to the radix tree code. Oops.</Note>
    </Notes>
    <CVE>CVE-2021-47432</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47432.html</URL>
        <Description>CVE-2021-47432</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225391</URL>
        <Description>SUSE Bug 1225391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

seg6: fix the iif in the IPv6 socket control block

When an IPv4 packet is received, the ip_rcv_core(...) sets the receiving
interface index into the IPv4 socket control block (v5.16-rc4,
net/ipv4/ip_input.c line 510):

    IPCB(skb)-&gt;iif = skb-&gt;skb_iif;

If that IPv4 packet is meant to be encapsulated in an outer IPv6+SRH
header, the seg6_do_srh_encap(...) performs the required encapsulation.
In this case, the seg6_do_srh_encap function clears the IPv6 socket control
block (v5.16-rc4 net/ipv6/seg6_iptunnel.c line 163):

    memset(IP6CB(skb), 0, sizeof(*IP6CB(skb)));

The memset(...) was introduced in commit ef489749aae5 ("ipv6: sr: clear
IP6CB(skb) on SRH ip4ip6 encapsulation") a long time ago (2019-01-29).

Since the IPv6 socket control block and the IPv4 socket control block share
the same memory area (skb-&gt;cb), the receiving interface index info is lost
(IP6CB(skb)-&gt;iif is set to zero).

As a side effect, that condition triggers a NULL pointer dereference if
commit 0857d6f8c759 ("ipv6: When forwarding count rx stats on the orig
netdev") is applied.

To fix that issue, we set the IP6CB(skb)-&gt;iif with the index of the
receiving interface once again.</Note>
    </Notes>
    <CVE>CVE-2021-47515</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47515.html</URL>
        <Description>CVE-2021-47515</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225426</URL>
        <Description>SUSE Bug 1225426</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/vc4: kms: Add missing drm_crtc_commit_put

Commit 9ec03d7f1ed3 ("drm/vc4: kms: Wait on previous FIFO users before a
commit") introduced a global state for the HVS, with each FIFO storing
the current CRTC commit so that we can properly synchronize commits.

However, the refcounting was off and we thus ended up leaking the
drm_crtc_commit structure every commit. Add a drm_crtc_commit_put to
prevent the leakage.</Note>
    </Notes>
    <CVE>CVE-2021-47534</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47534.html</URL>
        <Description>CVE-2021-47534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230903</URL>
        <Description>SUSE Bug 1230903</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer()

Need to call rxrpc_put_local() for peer candidate before kfree() as it
holds a ref to rxrpc_local.

[DH: v2: Changed to abstract the peer freeing code out into a function]</Note>
    </Notes>
    <CVE>CVE-2021-47538</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47538.html</URL>
        <Description>CVE-2021-47538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225448</URL>
        <Description>SUSE Bug 1225448</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle()

Need to call rxrpc_put_peer() for bundle candidate before kfree() as it
holds a ref to rxrpc_peer.

[DH: v2: Changed to abstract out the bundle freeing code into a function]</Note>
    </Notes>
    <CVE>CVE-2021-47539</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47539.html</URL>
        <Description>CVE-2021-47539</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225452</URL>
        <Description>SUSE Bug 1225452</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: vlan: fix underflow for the real_dev refcnt

Inject error before dev_hold(real_dev) in register_vlan_dev(),
and execute the following testcase:

ip link add dev dummy1 type dummy
ip link add name dummy1.100 link dummy1 type vlan id 100
ip link del dev dummy1

When the dummy netdevice is removed, we will get a WARNING as following:

=======================================================================
refcount_t: decrement hit 0; leaking memory.
WARNING: CPU: 2 PID: 0 at lib/refcount.c:31 refcount_warn_saturate+0xbf/0x1e0

and an endless loop of:

=======================================================================
unregister_netdevice: waiting for dummy1 to become free. Usage count = -1073741824

That is because dev_put(real_dev) in vlan_dev_free() be called without
dev_hold(real_dev) in register_vlan_dev(). It makes the refcnt of real_dev
underflow.

Move the dev_hold(real_dev) to vlan_dev_init() which is the call-back of
ndo_init(). That makes dev_hold() and dev_put() for vlan's real_dev
symmetrical.</Note>
    </Notes>
    <CVE>CVE-2021-47555</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47555.html</URL>
        <Description>CVE-2021-47555</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225467</URL>
        <Description>SUSE Bug 1225467</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

proc/vmcore: fix clearing user buffer by properly using clear_user()

To clear a user buffer we cannot simply use memset, we have to use
clear_user().  With a virtio-mem device that registers a vmcore_cb and
has some logically unplugged memory inside an added Linux memory block,
I can easily trigger a BUG by copying the vmcore via "cp":

  systemd[1]: Starting Kdump Vmcore Save Service...
  kdump[420]: Kdump is using the default log level(3).
  kdump[453]: saving to /sysroot/var/crash/127.0.0.1-2021-11-11-14:59:22/
  kdump[458]: saving vmcore-dmesg.txt to /sysroot/var/crash/127.0.0.1-2021-11-11-14:59:22/
  kdump[465]: saving vmcore-dmesg.txt complete
  kdump[467]: saving vmcore
  BUG: unable to handle page fault for address: 00007f2374e01000
  #PF: supervisor write access in kernel mode
  #PF: error_code(0x0003) - permissions violation
  PGD 7a523067 P4D 7a523067 PUD 7a528067 PMD 7a525067 PTE 800000007048f867
  Oops: 0003 [#1] PREEMPT SMP NOPTI
  CPU: 0 PID: 468 Comm: cp Not tainted 5.15.0+ #6
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.14.0-27-g64f37cc530f1-prebuilt.qemu.org 04/01/2014
  RIP: 0010:read_from_oldmem.part.0.cold+0x1d/0x86
  Code: ff ff ff e8 05 ff fe ff e9 b9 e9 7f ff 48 89 de 48 c7 c7 38 3b 60 82 e8 f1 fe fe ff 83 fd 08 72 3c 49 8d 7d 08 4c 89 e9 89 e8 &lt;49&gt; c7 45 00 00 00 00 00 49 c7 44 05 f8 00 00 00 00 48 83 e7 f81
  RSP: 0018:ffffc9000073be08 EFLAGS: 00010212
  RAX: 0000000000001000 RBX: 00000000002fd000 RCX: 00007f2374e01000
  RDX: 0000000000000001 RSI: 00000000ffffdfff RDI: 00007f2374e01008
  RBP: 0000000000001000 R08: 0000000000000000 R09: ffffc9000073bc50
  R10: ffffc9000073bc48 R11: ffffffff829461a8 R12: 000000000000f000
  R13: 00007f2374e01000 R14: 0000000000000000 R15: ffff88807bd421e8
  FS:  00007f2374e12140(0000) GS:ffff88807f000000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007f2374e01000 CR3: 000000007a4aa000 CR4: 0000000000350eb0
  Call Trace:
   read_vmcore+0x236/0x2c0
   proc_reg_read+0x55/0xa0
   vfs_read+0x95/0x190
   ksys_read+0x4f/0xc0
   do_syscall_64+0x3b/0x90
   entry_SYSCALL_64_after_hwframe+0x44/0xae

Some x86-64 CPUs have a CPU feature called "Supervisor Mode Access
Prevention (SMAP)", which is used to detect wrong access from the kernel
to user buffers like this: SMAP triggers a permissions violation on
wrong access.  In the x86-64 variant of clear_user(), SMAP is properly
handled via clac()+stac().

To fix, properly use clear_user() when we're dealing with a user buffer.</Note>
    </Notes>
    <CVE>CVE-2021-47566</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47566.html</URL>
        <Description>CVE-2021-47566</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225514</URL>
        <Description>SUSE Bug 1225514</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect()

The free_rtllib() function frees the "dev" pointer so there is use
after free on the next line.  Re-arrange things to avoid that.</Note>
    </Notes>
    <CVE>CVE-2021-47571</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47571.html</URL>
        <Description>CVE-2021-47571</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225518</URL>
        <Description>SUSE Bug 1225518</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227551</URL>
        <Description>SUSE Bug 1227551</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: nexthop: fix null pointer dereference when IPv6 is not enabled

When we try to add an IPv6 nexthop and IPv6 is not enabled
(!CONFIG_IPV6) we'll hit a NULL pointer dereference[1] in the error path
of nh_create_ipv6() due to calling ipv6_stub-&gt;fib6_nh_release. The bug
has been present since the beginning of IPv6 nexthop gateway support.
Commit 1aefd3de7bc6 ("ipv6: Add fib6_nh_init and release to stubs") tells
us that only fib6_nh_init has a dummy stub because fib6_nh_release should
not be called if fib6_nh_init returns an error, but the commit below added
a call to ipv6_stub-&gt;fib6_nh_release in its error path. To fix it return
the dummy stub's -EAFNOSUPPORT error directly without calling
ipv6_stub-&gt;fib6_nh_release in nh_create_ipv6()'s error path.

[1]
 Output is a bit truncated, but it clearly shows the error.
 BUG: kernel NULL pointer dereference, address: 000000000000000000
 #PF: supervisor instruction fetch in kernel modede
 #PF: error_code(0x0010) - not-present pagege
 PGD 0 P4D 0
 Oops: 0010 [#1] PREEMPT SMP NOPTI
 CPU: 4 PID: 638 Comm: ip Kdump: loaded Not tainted 5.16.0-rc1+ #446
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-4.fc34 04/01/2014
 RIP: 0010:0x0
 Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.
 RSP: 0018:ffff888109f5b8f0 EFLAGS: 00010286^Ac
 RAX: 0000000000000000 RBX: ffff888109f5ba28 RCX: 0000000000000000
 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8881008a2860
 RBP: ffff888109f5b9d8 R08: 0000000000000000 R09: 0000000000000000
 R10: ffff888109f5b978 R11: ffff888109f5b948 R12: 00000000ffffff9f
 R13: ffff8881008a2a80 R14: ffff8881008a2860 R15: ffff8881008a2840
 FS:  00007f98de70f100(0000) GS:ffff88822bf00000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: ffffffffffffffd6 CR3: 0000000100efc000 CR4: 00000000000006e0
 Call Trace:
  &lt;TASK&gt;
  nh_create_ipv6+0xed/0x10c
  rtm_new_nexthop+0x6d7/0x13f3
  ? check_preemption_disabled+0x3d/0xf2
  ? lock_is_held_type+0xbe/0xfd
  rtnetlink_rcv_msg+0x23f/0x26a
  ? check_preemption_disabled+0x3d/0xf2
  ? rtnl_calcit.isra.0+0x147/0x147
  netlink_rcv_skb+0x61/0xb2
  netlink_unicast+0x100/0x187
  netlink_sendmsg+0x37f/0x3a0
  ? netlink_unicast+0x187/0x187
  sock_sendmsg_nosec+0x67/0x9b
  ____sys_sendmsg+0x19d/0x1f9
  ? copy_msghdr_from_user+0x4c/0x5e
  ? rcu_read_lock_any_held+0x2a/0x78
  ___sys_sendmsg+0x6c/0x8c
  ? asm_sysvec_apic_timer_interrupt+0x12/0x20
  ? lockdep_hardirqs_on+0xd9/0x102
  ? sockfd_lookup_light+0x69/0x99
  __sys_sendmsg+0x50/0x6e
  do_syscall_64+0xcb/0xf2
  entry_SYSCALL_64_after_hwframe+0x44/0xae
 RIP: 0033:0x7f98dea28914
 Code: 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b5 0f 1f 80 00 00 00 00 48 8d 05 e9 5d 0c 00 8b 00 85 c0 75 13 b8 2e 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 54 c3 0f 1f 00 41 54 41 89 d4 55 48 89 f5 53
 RSP: 002b:00007fff859f5e68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e2e
 RAX: ffffffffffffffda RBX: 00000000619cb810 RCX: 00007f98dea28914
 RDX: 0000000000000000 RSI: 00007fff859f5ed0 RDI: 0000000000000003
 RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000008
 R10: fffffffffffffce6 R11: 0000000000000246 R12: 0000000000000001
 R13: 000055c0097ae520 R14: 000055c0097957fd R15: 00007fff859f63a0
 &lt;/TASK&gt;
 Modules linked in: bridge stp llc bonding virtio_net</Note>
    </Notes>
    <CVE>CVE-2021-47572</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47572.html</URL>
        <Description>CVE-2021-47572</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225389</URL>
        <Description>SUSE Bug 1225389</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select()

In resp_mode_select() sanity check the block descriptor len to avoid UAF.

BUG: KASAN: use-after-free in resp_mode_select+0xa4c/0xb40 drivers/scsi/scsi_debug.c:2509
Read of size 1 at addr ffff888026670f50 by task scsicmd/15032

CPU: 1 PID: 15032 Comm: scsicmd Not tainted 5.15.0-01d0625 #15
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x89/0xb5 lib/dump_stack.c:107
 print_address_description.constprop.9+0x28/0x160 mm/kasan/report.c:257
 kasan_report.cold.14+0x7d/0x117 mm/kasan/report.c:443
 __asan_report_load1_noabort+0x14/0x20 mm/kasan/report_generic.c:306
 resp_mode_select+0xa4c/0xb40 drivers/scsi/scsi_debug.c:2509
 schedule_resp+0x4af/0x1a10 drivers/scsi/scsi_debug.c:5483
 scsi_debug_queuecommand+0x8c9/0x1e70 drivers/scsi/scsi_debug.c:7537
 scsi_queue_rq+0x16b4/0x2d10 drivers/scsi/scsi_lib.c:1521
 blk_mq_dispatch_rq_list+0xb9b/0x2700 block/blk-mq.c:1640
 __blk_mq_sched_dispatch_requests+0x28f/0x590 block/blk-mq-sched.c:325
 blk_mq_sched_dispatch_requests+0x105/0x190 block/blk-mq-sched.c:358
 __blk_mq_run_hw_queue+0xe5/0x150 block/blk-mq.c:1762
 __blk_mq_delay_run_hw_queue+0x4f8/0x5c0 block/blk-mq.c:1839
 blk_mq_run_hw_queue+0x18d/0x350 block/blk-mq.c:1891
 blk_mq_sched_insert_request+0x3db/0x4e0 block/blk-mq-sched.c:474
 blk_execute_rq_nowait+0x16b/0x1c0 block/blk-exec.c:63
 sg_common_write.isra.18+0xeb3/0x2000 drivers/scsi/sg.c:837
 sg_new_write.isra.19+0x570/0x8c0 drivers/scsi/sg.c:775
 sg_ioctl_common+0x14d6/0x2710 drivers/scsi/sg.c:941
 sg_ioctl+0xa2/0x180 drivers/scsi/sg.c:1166
 __x64_sys_ioctl+0x19d/0x220 fs/ioctl.c:52
 do_syscall_64+0x3a/0x80 arch/x86/entry/common.c:50
 entry_SYSCALL_64_after_hwframe+0x44/0xae arch/x86/entry/entry_64.S:113</Note>
    </Notes>
    <CVE>CVE-2021-47576</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47576.html</URL>
        <Description>CVE-2021-47576</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226537</URL>
        <Description>SUSE Bug 1226537</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

io-wq: check for wq exit after adding new worker task_work

We check IO_WQ_BIT_EXIT before attempting to create a new worker, and
wq exit cancels pending work if we have any. But it's possible to have
a race between the two, where creation checks exit finding it not set,
but we're in the process of exiting. The exit side will cancel pending
creation task_work, but there's a gap where we add task_work after we've
canceled existing creations at exit time.

Fix this by checking the EXIT bit post adding the creation task_work.
If it's set, run the same cancelation that exit does.</Note>
    </Notes>
    <CVE>CVE-2021-47577</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47577.html</URL>
        <Description>CVE-2021-47577</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226538</URL>
        <Description>SUSE Bug 1226538</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: scsi_debug: Don't call kcalloc() if size arg is zero

If the size arg to kcalloc() is zero, it returns ZERO_SIZE_PTR.  Because of
that, for a following NULL pointer check to work on the returned pointer,
kcalloc() must not be called with the size arg equal to zero. Return early
without error before the kcalloc() call if size arg is zero.

BUG: KASAN: null-ptr-deref in memcpy include/linux/fortify-string.h:191 [inline]
BUG: KASAN: null-ptr-deref in sg_copy_buffer+0x138/0x240 lib/scatterlist.c:974
Write of size 4 at addr 0000000000000010 by task syz-executor.1/22789

CPU: 1 PID: 22789 Comm: syz-executor.1 Not tainted 5.15.0-syzk #1
Hardware name: Red Hat KVM, BIOS 1.13.0-2
Call Trace:
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x89/0xb5 lib/dump_stack.c:106
 __kasan_report mm/kasan/report.c:446 [inline]
 kasan_report.cold.14+0x112/0x117 mm/kasan/report.c:459
 check_region_inline mm/kasan/generic.c:183 [inline]
 kasan_check_range+0x1a3/0x210 mm/kasan/generic.c:189
 memcpy+0x3b/0x60 mm/kasan/shadow.c:66
 memcpy include/linux/fortify-string.h:191 [inline]
 sg_copy_buffer+0x138/0x240 lib/scatterlist.c:974
 do_dout_fetch drivers/scsi/scsi_debug.c:2954 [inline]
 do_dout_fetch drivers/scsi/scsi_debug.c:2946 [inline]
 resp_verify+0x49e/0x930 drivers/scsi/scsi_debug.c:4276
 schedule_resp+0x4d8/0x1a70 drivers/scsi/scsi_debug.c:5478
 scsi_debug_queuecommand+0x8c9/0x1ec0 drivers/scsi/scsi_debug.c:7533
 scsi_dispatch_cmd drivers/scsi/scsi_lib.c:1520 [inline]
 scsi_queue_rq+0x16b0/0x2d40 drivers/scsi/scsi_lib.c:1699
 blk_mq_dispatch_rq_list+0xb9b/0x2700 block/blk-mq.c:1639
 __blk_mq_sched_dispatch_requests+0x28f/0x590 block/blk-mq-sched.c:325
 blk_mq_sched_dispatch_requests+0x105/0x190 block/blk-mq-sched.c:358
 __blk_mq_run_hw_queue+0xe5/0x150 block/blk-mq.c:1761
 __blk_mq_delay_run_hw_queue+0x4f8/0x5c0 block/blk-mq.c:1838
 blk_mq_run_hw_queue+0x18d/0x350 block/blk-mq.c:1891
 blk_mq_sched_insert_request+0x3db/0x4e0 block/blk-mq-sched.c:474
 blk_execute_rq_nowait+0x16b/0x1c0 block/blk-exec.c:62
 blk_execute_rq+0xdb/0x360 block/blk-exec.c:102
 sg_scsi_ioctl drivers/scsi/scsi_ioctl.c:621 [inline]
 scsi_ioctl+0x8bb/0x15c0 drivers/scsi/scsi_ioctl.c:930
 sg_ioctl_common+0x172d/0x2710 drivers/scsi/sg.c:1112
 sg_ioctl+0xa2/0x180 drivers/scsi/sg.c:1165
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:874 [inline]
 __se_sys_ioctl fs/ioctl.c:860 [inline]
 __x64_sys_ioctl+0x19d/0x220 fs/ioctl.c:860
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3a/0x80 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae</Note>
    </Notes>
    <CVE>CVE-2021-47578</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47578.html</URL>
        <Description>CVE-2021-47578</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226539</URL>
        <Description>SUSE Bug 1226539</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: scsi_debug: Fix type in min_t to avoid stack OOB

Change min_t() to use type "u32" instead of type "int" to avoid stack out
of bounds. With min_t() type "int" the values get sign extended and the
larger value gets used causing stack out of bounds.

BUG: KASAN: stack-out-of-bounds in memcpy include/linux/fortify-string.h:191 [inline]
BUG: KASAN: stack-out-of-bounds in sg_copy_buffer+0x1de/0x240 lib/scatterlist.c:976
Read of size 127 at addr ffff888072607128 by task syz-executor.7/18707

CPU: 1 PID: 18707 Comm: syz-executor.7 Not tainted 5.15.0-syzk #1
Hardware name: Red Hat KVM, BIOS 1.13.0-2
Call Trace:
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x89/0xb5 lib/dump_stack.c:106
 print_address_description.constprop.9+0x28/0x160 mm/kasan/report.c:256
 __kasan_report mm/kasan/report.c:442 [inline]
 kasan_report.cold.14+0x7d/0x117 mm/kasan/report.c:459
 check_region_inline mm/kasan/generic.c:183 [inline]
 kasan_check_range+0x1a3/0x210 mm/kasan/generic.c:189
 memcpy+0x23/0x60 mm/kasan/shadow.c:65
 memcpy include/linux/fortify-string.h:191 [inline]
 sg_copy_buffer+0x1de/0x240 lib/scatterlist.c:976
 sg_copy_from_buffer+0x33/0x40 lib/scatterlist.c:1000
 fill_from_dev_buffer.part.34+0x82/0x130 drivers/scsi/scsi_debug.c:1162
 fill_from_dev_buffer drivers/scsi/scsi_debug.c:1888 [inline]
 resp_readcap16+0x365/0x3b0 drivers/scsi/scsi_debug.c:1887
 schedule_resp+0x4d8/0x1a70 drivers/scsi/scsi_debug.c:5478
 scsi_debug_queuecommand+0x8c9/0x1ec0 drivers/scsi/scsi_debug.c:7533
 scsi_dispatch_cmd drivers/scsi/scsi_lib.c:1520 [inline]
 scsi_queue_rq+0x16b0/0x2d40 drivers/scsi/scsi_lib.c:1699
 blk_mq_dispatch_rq_list+0xb9b/0x2700 block/blk-mq.c:1639
 __blk_mq_sched_dispatch_requests+0x28f/0x590 block/blk-mq-sched.c:325
 blk_mq_sched_dispatch_requests+0x105/0x190 block/blk-mq-sched.c:358
 __blk_mq_run_hw_queue+0xe5/0x150 block/blk-mq.c:1761
 __blk_mq_delay_run_hw_queue+0x4f8/0x5c0 block/blk-mq.c:1838
 blk_mq_run_hw_queue+0x18d/0x350 block/blk-mq.c:1891
 blk_mq_sched_insert_request+0x3db/0x4e0 block/blk-mq-sched.c:474
 blk_execute_rq_nowait+0x16b/0x1c0 block/blk-exec.c:62
 sg_common_write.isra.18+0xeb3/0x2000 drivers/scsi/sg.c:836
 sg_new_write.isra.19+0x570/0x8c0 drivers/scsi/sg.c:774
 sg_ioctl_common+0x14d6/0x2710 drivers/scsi/sg.c:939
 sg_ioctl+0xa2/0x180 drivers/scsi/sg.c:1165
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:874 [inline]
 __se_sys_ioctl fs/ioctl.c:860 [inline]
 __x64_sys_ioctl+0x19d/0x220 fs/ioctl.c:860
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3a/0x80 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae</Note>
    </Notes>
    <CVE>CVE-2021-47580</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47580.html</URL>
        <Description>CVE-2021-47580</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226550</URL>
        <Description>SUSE Bug 1226550</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227611</URL>
        <Description>SUSE Bug 1227611</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

USB: core: Make do_proc_control() and do_proc_bulk() killable

The USBDEVFS_CONTROL and USBDEVFS_BULK ioctls invoke
usb_start_wait_urb(), which contains an uninterruptible wait with a
user-specified timeout value.  If timeout value is very large and the
device being accessed does not respond in a reasonable amount of time,
the kernel will complain about "Task X blocked for more than N
seconds", as found in testing by syzbot:

INFO: task syz-executor.0:8700 blocked for more than 143 seconds.
      Not tainted 5.14.0-rc7-syzkaller #0
"echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor.0  state:D stack:23192 pid: 8700 ppid:  8455 flags:0x00004004
Call Trace:
 context_switch kernel/sched/core.c:4681 [inline]
 __schedule+0xc07/0x11f0 kernel/sched/core.c:5938
 schedule+0x14b/0x210 kernel/sched/core.c:6017
 schedule_timeout+0x98/0x2f0 kernel/time/timer.c:1857
 do_wait_for_common+0x2da/0x480 kernel/sched/completion.c:85
 __wait_for_common kernel/sched/completion.c:106 [inline]
 wait_for_common kernel/sched/completion.c:117 [inline]
 wait_for_completion_timeout+0x46/0x60 kernel/sched/completion.c:157
 usb_start_wait_urb+0x167/0x550 drivers/usb/core/message.c:63
 do_proc_bulk+0x978/0x1080 drivers/usb/core/devio.c:1236
 proc_bulk drivers/usb/core/devio.c:1273 [inline]
 usbdev_do_ioctl drivers/usb/core/devio.c:2547 [inline]
 usbdev_ioctl+0x3441/0x6b10 drivers/usb/core/devio.c:2713
...

To fix this problem, this patch replaces usbfs's calls to
usb_control_msg() and usb_bulk_msg() with special-purpose code that
does essentially the same thing (as recommended in the comment for
usb_start_wait_urb()), except that it always uses a killable wait and
it uses GFP_KERNEL rather than GFP_NOIO.</Note>
    </Notes>
    <CVE>CVE-2021-47582</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47582.html</URL>
        <Description>CVE-2021-47582</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226559</URL>
        <Description>SUSE Bug 1226559</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

media: mxl111sf: change mutex_init() location

Syzbot reported, that mxl111sf_ctrl_msg() uses uninitialized
mutex. The problem was in wrong mutex_init() location.

Previous mutex_init(&amp;state-&gt;msg_lock) call was in -&gt;init() function, but
dvb_usbv2_init() has this order of calls:

	dvb_usbv2_init()
	  dvb_usbv2_adapter_init()
	    dvb_usbv2_adapter_frontend_init()
	      props-&gt;frontend_attach()

	  props-&gt;init()

Since mxl111sf_* devices call mxl111sf_ctrl_msg() in -&gt;frontend_attach()
internally we need to initialize state-&gt;msg_lock before
frontend_attach(). To achieve it, -&gt;probe() call added to all mxl111sf_*
devices, which will simply initiaize mutex.</Note>
    </Notes>
    <CVE>CVE-2021-47583</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47583.html</URL>
        <Description>CVE-2021-47583</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226563</URL>
        <Description>SUSE Bug 1226563</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

iocost: Fix divide-by-zero on donation from low hweight cgroup

The donation calculation logic assumes that the donor has non-zero
after-donation hweight, so the lowest active hweight a donating cgroup can
have is 2 so that it can donate 1 while keeping the other 1 for itself.
Earlier, we only donated from cgroups with sizable surpluses so this
condition was always true. However, with the precise donation algorithm
implemented, f1de2439ec43 ("blk-iocost: revamp donation amount
determination") made the donation amount calculation exact enabling even low
hweight cgroups to donate.

This means that in rare occasions, a cgroup with active hweight of 1 can
enter donation calculation triggering the following warning and then a
divide-by-zero oops.

 WARNING: CPU: 4 PID: 0 at block/blk-iocost.c:1928 transfer_surpluses.cold+0x0/0x53 [884/94867]
 ...
 RIP: 0010:transfer_surpluses.cold+0x0/0x53
 Code: 92 ff 48 c7 c7 28 d1 ab b5 65 48 8b 34 25 00 ae 01 00 48 81 c6 90 06 00 00 e8 8b 3f fe ff 48 c7 c0 ea ff ff ff e9 95 ff 92 ff &lt;0f&gt; 0b 48 c7 c7 30 da ab b5 e8 71 3f fe ff 4c 89 e8 4d 85 ed 74 0
4
 ...
 Call Trace:
  &lt;IRQ&gt;
  ioc_timer_fn+0x1043/0x1390
  call_timer_fn+0xa1/0x2c0
  __run_timers.part.0+0x1ec/0x2e0
  run_timer_softirq+0x35/0x70
 ...
 iocg: invalid donation weights in /a/b: active=1 donating=1 after=0

Fix it by excluding cgroups w/ active hweight &lt; 2 from donating. Excluding
these extreme low hweight donations shouldn't affect work conservation in
any meaningful way.</Note>
    </Notes>
    <CVE>CVE-2021-47584</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47584.html</URL>
        <Description>CVE-2021-47584</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226564</URL>
        <Description>SUSE Bug 1226564</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix memory leak in __add_inode_ref()

Line 1169 (#3) allocates a memory chunk for victim_name by kmalloc(),
but  when the function returns in line 1184 (#4) victim_name allocated
by line 1169 (#3) is not freed, which will lead to a memory leak.
There is a similar snippet of code in this function as allocating a memory
chunk for victim_name in line 1104 (#1) as well as releasing the memory
in line 1116 (#2).

We should kfree() victim_name when the return value of backref_in_log()
is less than zero and before the function returns in line 1184 (#4).

1057 static inline int __add_inode_ref(struct btrfs_trans_handle *trans,
1058 				  struct btrfs_root *root,
1059 				  struct btrfs_path *path,
1060 				  struct btrfs_root *log_root,
1061 				  struct btrfs_inode *dir,
1062 				  struct btrfs_inode *inode,
1063 				  u64 inode_objectid, u64 parent_objectid,
1064 				  u64 ref_index, char *name, int namelen,
1065 				  int *search_done)
1066 {

1104 	victim_name = kmalloc(victim_name_len, GFP_NOFS);
	// #1: kmalloc (victim_name-1)
1105 	if (!victim_name)
1106 		return -ENOMEM;

1112	ret = backref_in_log(log_root, &amp;search_key,
1113			parent_objectid, victim_name,
1114			victim_name_len);
1115	if (ret &lt; 0) {
1116		kfree(victim_name); // #2: kfree (victim_name-1)
1117		return ret;
1118	} else if (!ret) {

1169 	victim_name = kmalloc(victim_name_len, GFP_NOFS);
	// #3: kmalloc (victim_name-2)
1170 	if (!victim_name)
1171 		return -ENOMEM;

1180 	ret = backref_in_log(log_root, &amp;search_key,
1181 			parent_objectid, victim_name,
1182 			victim_name_len);
1183 	if (ret &lt; 0) {
1184 		return ret; // #4: missing kfree (victim_name-2)
1185 	} else if (!ret) {

1241 	return 0;
1242 }</Note>
    </Notes>
    <CVE>CVE-2021-47585</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47585.html</URL>
        <Description>CVE-2021-47585</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226556</URL>
        <Description>SUSE Bug 1226556</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: dwmac-rk: fix oob read in rk_gmac_setup

KASAN reports an out-of-bounds read in rk_gmac_setup on the line:

	while (ops-&gt;regs[i]) {

This happens for most platforms since the regs flexible array member is
empty, so the memory after the ops structure is being read here.  It
seems that mostly this happens to contain zero anyway, so we get lucky
and everything still works.

To avoid adding redundant data to nearly all the ops structures, add a
new flag to indicate whether the regs field is valid and avoid this loop
when it is not.</Note>
    </Notes>
    <CVE>CVE-2021-47586</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47586.html</URL>
        <Description>CVE-2021-47586</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226561</URL>
        <Description>SUSE Bug 1226561</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: systemport: Add global locking for descriptor lifecycle

The descriptor list is a shared resource across all of the transmit queues, and
the locking mechanism used today only protects concurrency across a given
transmit queue between the transmit and reclaiming. This creates an opportunity
for the SYSTEMPORT hardware to work on corrupted descriptors if we have
multiple producers at once which is the case when using multiple transmit
queues.

This was particularly noticeable when using multiple flows/transmit queues and
it showed up in interesting ways in that UDP packets would get a correct UDP
header checksum being calculated over an incorrect packet length. Similarly TCP
packets would get an equally correct checksum computed by the hardware over an
incorrect packet length.

The SYSTEMPORT hardware maintains an internal descriptor list that it re-arranges
when the driver produces a new descriptor anytime it writes to the
WRITE_PORT_{HI,LO} registers, there is however some delay in the hardware to
re-organize its descriptors and it is possible that concurrent TX queues
eventually break this internal allocation scheme to the point where the
length/status part of the descriptor gets used for an incorrect data buffer.

The fix is to impose a global serialization for all TX queues in the short
section where we are writing to the WRITE_PORT_{HI,LO} registers which solves
the corruption even with multiple concurrent TX queues being used.</Note>
    </Notes>
    <CVE>CVE-2021-47587</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47587.html</URL>
        <Description>CVE-2021-47587</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226567</URL>
        <Description>SUSE Bug 1226567</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

igbvf: fix double free in `igbvf_probe`

In `igbvf_probe`, if register_netdev() fails, the program will go to
label err_hw_init, and then to label err_ioremap. In free_netdev() which
is just below label err_ioremap, there is `list_for_each_entry_safe` and
`netif_napi_del` which aims to delete all entries in `dev-&gt;napi_list`.
The program has added an entry `adapter-&gt;rx_ring-&gt;napi` which is added by
`netif_napi_add` in igbvf_alloc_queues(). However, adapter-&gt;rx_ring has
been freed below label err_hw_init. So this a UAF.

In terms of how to patch the problem, we can refer to igbvf_remove() and
delete the entry before `adapter-&gt;rx_ring`.

The KASAN logs are as follows:

[   35.126075] BUG: KASAN: use-after-free in free_netdev+0x1fd/0x450
[   35.127170] Read of size 8 at addr ffff88810126d990 by task modprobe/366
[   35.128360]
[   35.128643] CPU: 1 PID: 366 Comm: modprobe Not tainted 5.15.0-rc2+ #14
[   35.129789] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014
[   35.131749] Call Trace:
[   35.132199]  dump_stack_lvl+0x59/0x7b
[   35.132865]  print_address_description+0x7c/0x3b0
[   35.133707]  ? free_netdev+0x1fd/0x450
[   35.134378]  __kasan_report+0x160/0x1c0
[   35.135063]  ? free_netdev+0x1fd/0x450
[   35.135738]  kasan_report+0x4b/0x70
[   35.136367]  free_netdev+0x1fd/0x450
[   35.137006]  igbvf_probe+0x121d/0x1a10 [igbvf]
[   35.137808]  ? igbvf_vlan_rx_add_vid+0x100/0x100 [igbvf]
[   35.138751]  local_pci_probe+0x13c/0x1f0
[   35.139461]  pci_device_probe+0x37e/0x6c0
[   35.165526]
[   35.165806] Allocated by task 366:
[   35.166414]  ____kasan_kmalloc+0xc4/0xf0
[   35.167117]  foo_kmem_cache_alloc_trace+0x3c/0x50 [igbvf]
[   35.168078]  igbvf_probe+0x9c5/0x1a10 [igbvf]
[   35.168866]  local_pci_probe+0x13c/0x1f0
[   35.169565]  pci_device_probe+0x37e/0x6c0
[   35.179713]
[   35.179993] Freed by task 366:
[   35.180539]  kasan_set_track+0x4c/0x80
[   35.181211]  kasan_set_free_info+0x1f/0x40
[   35.181942]  ____kasan_slab_free+0x103/0x140
[   35.182703]  kfree+0xe3/0x250
[   35.183239]  igbvf_probe+0x1173/0x1a10 [igbvf]
[   35.184040]  local_pci_probe+0x13c/0x1f0</Note>
    </Notes>
    <CVE>CVE-2021-47589</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47589.html</URL>
        <Description>CVE-2021-47589</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226557</URL>
        <Description>SUSE Bug 1226557</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: fix tc flower deletion for VLAN priority Rx steering

To replicate the issue:-

1) Add 1 flower filter for VLAN Priority based frame steering:-
$ IFDEVNAME=eth0
$ tc qdisc add dev $IFDEVNAME ingress
$ tc qdisc add dev $IFDEVNAME root mqprio num_tc 8 \
   map 0 1 2 3 4 5 6 7 0 0 0 0 0 0 0 0 \
   queues 1@0 1@1 1@2 1@3 1@4 1@5 1@6 1@7 hw 0
$ tc filter add dev $IFDEVNAME parent ffff: protocol 802.1Q \
   flower vlan_prio 0 hw_tc 0

2) Get the 'pref' id
$ tc filter show dev $IFDEVNAME ingress

3) Delete a specific tc flower record (say pref 49151)
$ tc filter del dev $IFDEVNAME parent ffff: pref 49151

From dmesg, we will observe kernel NULL pointer ooops

[  197.170464] BUG: kernel NULL pointer dereference, address: 0000000000000000
[  197.171367] #PF: supervisor read access in kernel mode
[  197.171367] #PF: error_code(0x0000) - not-present page
[  197.171367] PGD 0 P4D 0
[  197.171367] Oops: 0000 [#1] PREEMPT SMP NOPTI

&lt;snip&gt;

[  197.171367] RIP: 0010:tc_setup_cls+0x20b/0x4a0 [stmmac]

&lt;snip&gt;

[  197.171367] Call Trace:
[  197.171367]  &lt;TASK&gt;
[  197.171367]  ? __stmmac_disable_all_queues+0xa8/0xe0 [stmmac]
[  197.171367]  stmmac_setup_tc_block_cb+0x70/0x110 [stmmac]
[  197.171367]  tc_setup_cb_destroy+0xb3/0x180
[  197.171367]  fl_hw_destroy_filter+0x94/0xc0 [cls_flower]

The above issue is due to previous incorrect implementation of
tc_del_vlan_flow(), shown below, that uses flow_cls_offload_flow_rule()
to get struct flow_rule *rule which is no longer valid for tc filter
delete operation.

  struct flow_rule *rule = flow_cls_offload_flow_rule(cls);
  struct flow_dissector *dissector = rule-&gt;match.dissector;

So, to ensure tc_del_vlan_flow() deletes the right VLAN cls record for
earlier configured RX queue (configured by hw_tc) in tc_add_vlan_flow(),
this patch introduces stmmac_rfs_entry as driver-side flow_cls_offload
record for 'RX frame steering' tc flower, currently used for VLAN
priority. The implementation has taken consideration for future extension
to include other type RX frame steering such as EtherType based.

v2:
 - Clean up overly extensive backtrace and rewrite git message to better
   explain the kernel NULL pointer issue.</Note>
    </Notes>
    <CVE>CVE-2021-47592</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47592.html</URL>
        <Description>CVE-2021-47592</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226572</URL>
        <Description>SUSE Bug 1226572</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_ets: don't remove idle classes from the round-robin list

Shuang reported that the following script:

 1) tc qdisc add dev ddd0 handle 10: parent 1: ets bands 8 strict 4 priomap 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7
 2) mausezahn ddd0  -A 10.10.10.1 -B 10.10.10.2 -c 0 -a own -b 00:c1:a0:c1:a0:00 -t udp &amp;
 3) tc qdisc change dev ddd0 handle 10: ets bands 4 strict 2 quanta 2500 2500 priomap 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3

crashes systematically when line 2) is commented:

 list_del corruption, ffff8e028404bd30-&gt;next is LIST_POISON1 (dead000000000100)
 ------------[ cut here ]------------
 kernel BUG at lib/list_debug.c:47!
 invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
 CPU: 0 PID: 954 Comm: tc Not tainted 5.16.0-rc4+ #478
 Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014
 RIP: 0010:__list_del_entry_valid.cold.1+0x12/0x47
 Code: fe ff 0f 0b 48 89 c1 4c 89 c6 48 c7 c7 08 42 1b 87 e8 1d c5 fe ff 0f 0b 48 89 fe 48 89 c2 48 c7 c7 98 42 1b 87 e8 09 c5 fe ff &lt;0f&gt; 0b 48 c7 c7 48 43 1b 87 e8 fb c4 fe ff 0f 0b 48 89 f2 48 89 fe
 RSP: 0018:ffffae46807a3888 EFLAGS: 00010246
 RAX: 000000000000004e RBX: 0000000000000007 RCX: 0000000000000202
 RDX: 0000000000000000 RSI: ffffffff871ac536 RDI: 00000000ffffffff
 RBP: ffffae46807a3a10 R08: 0000000000000000 R09: c0000000ffff7fff
 R10: 0000000000000001 R11: ffffae46807a36a8 R12: ffff8e028404b800
 R13: ffff8e028404bd30 R14: dead000000000100 R15: ffff8e02fafa2400
 FS:  00007efdc92e4480(0000) GS:ffff8e02fb600000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000682f48 CR3: 00000001058be000 CR4: 0000000000350ef0
 Call Trace:
  &lt;TASK&gt;
  ets_qdisc_change+0x58b/0xa70 [sch_ets]
  tc_modify_qdisc+0x323/0x880
  rtnetlink_rcv_msg+0x169/0x4a0
  netlink_rcv_skb+0x50/0x100
  netlink_unicast+0x1a5/0x280
  netlink_sendmsg+0x257/0x4d0
  sock_sendmsg+0x5b/0x60
  ____sys_sendmsg+0x1f2/0x260
  ___sys_sendmsg+0x7c/0xc0
  __sys_sendmsg+0x57/0xa0
  do_syscall_64+0x3a/0x80
  entry_SYSCALL_64_after_hwframe+0x44/0xae
 RIP: 0033:0x7efdc8031338
 Code: 89 02 48 c7 c0 ff ff ff ff eb b5 0f 1f 80 00 00 00 00 f3 0f 1e fa 48 8d 05 25 43 2c 00 8b 00 85 c0 75 17 b8 2e 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 41 54 41 89 d4 55
 RSP: 002b:00007ffdf1ce9828 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
 RAX: ffffffffffffffda RBX: 0000000061b37a97 RCX: 00007efdc8031338
 RDX: 0000000000000000 RSI: 00007ffdf1ce9890 RDI: 0000000000000003
 RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000078a940
 R10: 000000000000000c R11: 0000000000000246 R12: 0000000000000001
 R13: 0000000000688880 R14: 0000000000000000 R15: 0000000000000000
  &lt;/TASK&gt;
 Modules linked in: sch_ets sch_tbf dummy rfkill iTCO_wdt iTCO_vendor_support intel_rapl_msr intel_rapl_common joydev pcspkr i2c_i801 virtio_balloon i2c_smbus lpc_ich ip_tables xfs libcrc32c crct10dif_pclmul crc32_pclmul crc32c_intel serio_raw ghash_clmulni_intel ahci libahci libata virtio_blk virtio_console virtio_net net_failover failover sunrpc dm_mirror dm_region_hash dm_log dm_mod [last unloaded: sch_ets]
 ---[ end trace f35878d1912655c2 ]---
 RIP: 0010:__list_del_entry_valid.cold.1+0x12/0x47
 Code: fe ff 0f 0b 48 89 c1 4c 89 c6 48 c7 c7 08 42 1b 87 e8 1d c5 fe ff 0f 0b 48 89 fe 48 89 c2 48 c7 c7 98 42 1b 87 e8 09 c5 fe ff &lt;0f&gt; 0b 48 c7 c7 48 43 1b 87 e8 fb c4 fe ff 0f 0b 48 89 f2 48 89 fe
 RSP: 0018:ffffae46807a3888 EFLAGS: 00010246
 RAX: 000000000000004e RBX: 0000000000000007 RCX: 0000000000000202
 RDX: 0000000000000000 RSI: ffffffff871ac536 RDI: 00000000ffffffff
 RBP: ffffae46807a3a10 R08: 0000000000000000 R09: c0000000ffff7fff
 R10: 0000000000000001 R11: ffffae46807a36a8 R12: ffff8e028404b800
 R13: ffff8e028404bd30 R14: dead000000000100 R15: ffff8e02fafa2400
 FS:  00007efdc92e4480(0000) GS:ffff8e02fb600000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 000000000
---truncated---</Note>
    </Notes>
    <CVE>CVE-2021-47595</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47595.html</URL>
        <Description>CVE-2021-47595</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226552</URL>
        <Description>SUSE Bug 1226552</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg

Currently, the hns3_remove function firstly uninstall client instance,
and then uninstall acceletion engine device. The netdevice is freed in
client instance uninstall process, but acceletion engine device uninstall
process still use it to trace runtime information. This causes a use after
free problem.

So fixes it by check the instance register state to avoid use after free.</Note>
    </Notes>
    <CVE>CVE-2021-47596</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47596.html</URL>
        <Description>CVE-2021-47596</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226558</URL>
        <Description>SUSE Bug 1226558</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

inet_diag: fix kernel-infoleak for UDP sockets

KMSAN reported a kernel-infoleak [1], that can exploited
by unpriv users.

After analysis it turned out UDP was not initializing
r-&gt;idiag_expires. Other users of inet_sk_diag_fill()
might make the same mistake in the future, so fix this
in inet_sk_diag_fill().

[1]
BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:121 [inline]
BUG: KMSAN: kernel-infoleak in copyout lib/iov_iter.c:156 [inline]
BUG: KMSAN: kernel-infoleak in _copy_to_iter+0x69d/0x25c0 lib/iov_iter.c:670
 instrument_copy_to_user include/linux/instrumented.h:121 [inline]
 copyout lib/iov_iter.c:156 [inline]
 _copy_to_iter+0x69d/0x25c0 lib/iov_iter.c:670
 copy_to_iter include/linux/uio.h:155 [inline]
 simple_copy_to_iter+0xf3/0x140 net/core/datagram.c:519
 __skb_datagram_iter+0x2cb/0x1280 net/core/datagram.c:425
 skb_copy_datagram_iter+0xdc/0x270 net/core/datagram.c:533
 skb_copy_datagram_msg include/linux/skbuff.h:3657 [inline]
 netlink_recvmsg+0x660/0x1c60 net/netlink/af_netlink.c:1974
 sock_recvmsg_nosec net/socket.c:944 [inline]
 sock_recvmsg net/socket.c:962 [inline]
 sock_read_iter+0x5a9/0x630 net/socket.c:1035
 call_read_iter include/linux/fs.h:2156 [inline]
 new_sync_read fs/read_write.c:400 [inline]
 vfs_read+0x1631/0x1980 fs/read_write.c:481
 ksys_read+0x28c/0x520 fs/read_write.c:619
 __do_sys_read fs/read_write.c:629 [inline]
 __se_sys_read fs/read_write.c:627 [inline]
 __x64_sys_read+0xdb/0x120 fs/read_write.c:627
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82
 entry_SYSCALL_64_after_hwframe+0x44/0xae

Uninit was created at:
 slab_post_alloc_hook mm/slab.h:524 [inline]
 slab_alloc_node mm/slub.c:3251 [inline]
 __kmalloc_node_track_caller+0xe0c/0x1510 mm/slub.c:4974
 kmalloc_reserve net/core/skbuff.c:354 [inline]
 __alloc_skb+0x545/0xf90 net/core/skbuff.c:426
 alloc_skb include/linux/skbuff.h:1126 [inline]
 netlink_dump+0x3d5/0x16a0 net/netlink/af_netlink.c:2245
 __netlink_dump_start+0xd1c/0xee0 net/netlink/af_netlink.c:2370
 netlink_dump_start include/linux/netlink.h:254 [inline]
 inet_diag_handler_cmd+0x2e7/0x400 net/ipv4/inet_diag.c:1343
 sock_diag_rcv_msg+0x24a/0x620
 netlink_rcv_skb+0x447/0x800 net/netlink/af_netlink.c:2491
 sock_diag_rcv+0x63/0x80 net/core/sock_diag.c:276
 netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]
 netlink_unicast+0x1095/0x1360 net/netlink/af_netlink.c:1345
 netlink_sendmsg+0x16f3/0x1870 net/netlink/af_netlink.c:1916
 sock_sendmsg_nosec net/socket.c:704 [inline]
 sock_sendmsg net/socket.c:724 [inline]
 sock_write_iter+0x594/0x690 net/socket.c:1057
 do_iter_readv_writev+0xa7f/0xc70
 do_iter_write+0x52c/0x1500 fs/read_write.c:851
 vfs_writev fs/read_write.c:924 [inline]
 do_writev+0x63f/0xe30 fs/read_write.c:967
 __do_sys_writev fs/read_write.c:1040 [inline]
 __se_sys_writev fs/read_write.c:1037 [inline]
 __x64_sys_writev+0xe5/0x120 fs/read_write.c:1037
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82
 entry_SYSCALL_64_after_hwframe+0x44/0xae

Bytes 68-71 of 312 are uninitialized
Memory access of size 312 starts at ffff88812ab54000
Data copied to user address 0000000020001440

CPU: 1 PID: 6365 Comm: syz-executor801 Not tainted 5.16.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011</Note>
    </Notes>
    <CVE>CVE-2021-47597</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47597.html</URL>
        <Description>CVE-2021-47597</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226553</URL>
        <Description>SUSE Bug 1226553</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

dm btree remove: fix use after free in rebalance_children()

Move dm_tm_unlock() after dm_tm_dec().</Note>
    </Notes>
    <CVE>CVE-2021-47600</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47600.html</URL>
        <Description>CVE-2021-47600</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226575</URL>
        <Description>SUSE Bug 1226575</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227472</URL>
        <Description>SUSE Bug 1227472</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tee: amdtee: fix an IS_ERR() vs NULL bug

The __get_free_pages() function does not return error pointers it returns
NULL so fix this condition to avoid a NULL dereference.</Note>
    </Notes>
    <CVE>CVE-2021-47601</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47601.html</URL>
        <Description>CVE-2021-47601</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226576</URL>
        <Description>SUSE Bug 1226576</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mac80211: track only QoS data frames for admission control

For admission control, obviously all of that only works for
QoS data frames, otherwise we cannot even access the QoS
field in the header.

Syzbot reported (see below) an uninitialized value here due
to a status of a non-QoS nullfunc packet, which isn't even
long enough to contain the QoS header.

Fix this to only do anything for QoS data packets.</Note>
    </Notes>
    <CVE>CVE-2021-47602</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47602.html</URL>
        <Description>CVE-2021-47602</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226554</URL>
        <Description>SUSE Bug 1226554</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

audit: improve robustness of the audit queue handling

If the audit daemon were ever to get stuck in a stopped state the
kernel's kauditd_thread() could get blocked attempting to send audit
records to the userspace audit daemon.  With the kernel thread
blocked it is possible that the audit queue could grow unbounded as
certain audit record generating events must be exempt from the queue
limits else the system enter a deadlock state.

This patch resolves this problem by lowering the kernel thread's
socket sending timeout from MAX_SCHEDULE_TIMEOUT to HZ/10 and tweaks
the kauditd_send_queue() function to better manage the various audit
queues when connection problems occur between the kernel and the
audit daemon.  With this patch, the backlog may temporarily grow
beyond the defined limits when the audit daemon is stopped and the
system is under heavy audit pressure, but kauditd_thread() will
continue to make progress and drain the queues as it would for other
connection problems.  For example, with the audit daemon put into a
stopped state and the system configured to audit every syscall it
was still possible to shutdown the system without a kernel panic,
deadlock, etc.; granted, the system was slow to shutdown but that is
to be expected given the extreme pressure of recording every syscall.

The timeout value of HZ/10 was chosen primarily through
experimentation and this developer's "gut feeling".  There is likely
no one perfect value, but as this scenario is limited in scope (root
privileges would be needed to send SIGSTOP to the audit daemon), it
is likely not worth exposing this as a tunable at present.  This can
always be done at a later date if it proves necessary.</Note>
    </Notes>
    <CVE>CVE-2021-47603</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47603.html</URL>
        <Description>CVE-2021-47603</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226577</URL>
        <Description>SUSE Bug 1226577</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

vduse: check that offset is within bounds in get_config()

This condition checks "len" but it does not check "offset" and that
could result in an out of bounds read if "offset &gt; dev-&gt;config_size".
The problem is that since both variables are unsigned the
"dev-&gt;config_size - offset" subtraction would result in a very high
unsigned value.

I think these checks might not be necessary because "len" and "offset"
are supposed to already have been validated using the
vhost_vdpa_config_validate() function.  But I do not know the code
perfectly, and I like to be safe.</Note>
    </Notes>
    <CVE>CVE-2021-47604</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47604.html</URL>
        <Description>CVE-2021-47604</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226566</URL>
        <Description>SUSE Bug 1226566</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

vduse: fix memory corruption in vduse_dev_ioctl()

The "config.offset" comes from the user.  There needs to a check to
prevent it being out of bounds.  The "config.offset" and
"dev-&gt;config_size" variables are both type u32.  So if the offset if
out of bounds then the "dev-&gt;config_size - config.offset" subtraction
results in a very high u32 value.  The out of bounds offset can result
in memory corruption.</Note>
    </Notes>
    <CVE>CVE-2021-47605</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47605.html</URL>
        <Description>CVE-2021-47605</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226579</URL>
        <Description>SUSE Bug 1226579</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227550</URL>
        <Description>SUSE Bug 1227550</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix kernel address leakage in atomic cmpxchg's r0 aux reg

The implementation of BPF_CMPXCHG on a high level has the following parameters:

  .-[old-val]                                          .-[new-val]
  BPF_R0 = cmpxchg{32,64}(DST_REG + insn-&gt;off, BPF_R0, SRC_REG)
                          `-[mem-loc]          `-[old-val]

Given a BPF insn can only have two registers (dst, src), the R0 is fixed and
used as an auxilliary register for input (old value) as well as output (returning
old value from memory location). While the verifier performs a number of safety
checks, it misses to reject unprivileged programs where R0 contains a pointer as
old value.

Through brute-forcing it takes about ~16sec on my machine to leak a kernel pointer
with BPF_CMPXCHG. The PoC is basically probing for kernel addresses by storing the
guessed address into the map slot as a scalar, and using the map value pointer as
R0 while SRC_REG has a canary value to detect a matching address.

Fix it by checking R0 for pointers, and reject if that's the case for unprivileged
programs.</Note>
    </Notes>
    <CVE>CVE-2021-47607</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47607.html</URL>
        <Description>CVE-2021-47607</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226580</URL>
        <Description>SUSE Bug 1226580</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix kernel address leakage in atomic fetch

The change in commit 37086bfdc737 ("bpf: Propagate stack bounds to registers
in atomics w/ BPF_FETCH") around check_mem_access() handling is buggy since
this would allow for unprivileged users to leak kernel pointers. For example,
an atomic fetch/and with -1 on a stack destination which holds a spilled
pointer will migrate the spilled register type into a scalar, which can then
be exported out of the program (since scalar != pointer) by dumping it into
a map value.

The original implementation of XADD was preventing this situation by using
a double call to check_mem_access() one with BPF_READ and a subsequent one
with BPF_WRITE, in both cases passing -1 as a placeholder value instead of
register as per XADD semantics since it didn't contain a value fetch. The
BPF_READ also included a check in check_stack_read_fixed_off() which rejects
the program if the stack slot is of __is_pointer_value() if dst_regno &lt; 0.
The latter is to distinguish whether we're dealing with a regular stack spill/
fill or some arithmetical operation which is disallowed on non-scalars, see
also 6e7e63cbb023 ("bpf: Forbid XADD on spilled pointers for unprivileged
users") for more context on check_mem_access() and its handling of placeholder
value -1.

One minimally intrusive option to fix the leak is for the BPF_FETCH case to
initially check the BPF_READ case via check_mem_access() with -1 as register,
followed by the actual load case with non-negative load_reg to propagate
stack bounds to registers.</Note>
    </Notes>
    <CVE>CVE-2021-47608</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47608.html</URL>
        <Description>CVE-2021-47608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226569</URL>
        <Description>SUSE Bug 1226569</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

firmware: arm_scpi: Fix string overflow in SCPI genpd driver

Without the bound checks for scpi_pd-&gt;name, it could result in the buffer
overflow when copying the SCPI device name from the corresponding device
tree node as the name string is set at maximum size of 30.

Let us fix it by using devm_kasprintf so that the string buffer is
allocated dynamically.</Note>
    </Notes>
    <CVE>CVE-2021-47609</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47609.html</URL>
        <Description>CVE-2021-47609</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226562</URL>
        <Description>SUSE Bug 1226562</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/msm: Fix null ptr access msm_ioctl_gem_submit()

Fix the below null pointer dereference in msm_ioctl_gem_submit():

 26545.260705:   Call trace:
 26545.263223:    kref_put+0x1c/0x60
 26545.266452:    msm_ioctl_gem_submit+0x254/0x744
 26545.270937:    drm_ioctl_kernel+0xa8/0x124
 26545.274976:    drm_ioctl+0x21c/0x33c
 26545.278478:    drm_compat_ioctl+0xdc/0xf0
 26545.282428:    __arm64_compat_sys_ioctl+0xc8/0x100
 26545.287169:    el0_svc_common+0xf8/0x250
 26545.291025:    do_el0_svc_compat+0x28/0x54
 26545.295066:    el0_svc_compat+0x10/0x1c
 26545.298838:    el0_sync_compat_handler+0xa8/0xcc
 26545.303403:    el0_sync_compat+0x188/0x1c0
 26545.307445:   Code: d503201f d503201f 52800028 4b0803e8 (b8680008)
 26545.318799:   Kernel panic - not syncing: Oops: Fatal exception</Note>
    </Notes>
    <CVE>CVE-2021-47610</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47610.html</URL>
        <Description>CVE-2021-47610</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226581</URL>
        <Description>SUSE Bug 1226581</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mac80211: validate extended element ID is present

Before attempting to parse an extended element, verify that
the extended element ID is present.</Note>
    </Notes>
    <CVE>CVE-2021-47611</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47611.html</URL>
        <Description>CVE-2021-47611</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226583</URL>
        <Description>SUSE Bug 1226583</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nfc: fix segfault in nfc_genl_dump_devices_done

When kmalloc in nfc_genl_dump_devices() fails then
nfc_genl_dump_devices_done() segfaults as below

KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
CPU: 0 PID: 25 Comm: kworker/0:1 Not tainted 5.16.0-rc4-01180-g2a987e65025e-dirty #5
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-6.fc35 04/01/2014
Workqueue: events netlink_sock_destruct_work
RIP: 0010:klist_iter_exit+0x26/0x80
Call Trace:
&lt;TASK&gt;
class_dev_iter_exit+0x15/0x20
nfc_genl_dump_devices_done+0x3b/0x50
genl_lock_done+0x84/0xd0
netlink_sock_destruct+0x8f/0x270
__sk_destruct+0x64/0x3b0
sk_destruct+0xa8/0xd0
__sk_free+0x2e8/0x3d0
sk_free+0x51/0x90
netlink_sock_destruct_work+0x1c/0x20
process_one_work+0x411/0x710
worker_thread+0x6fd/0xa80</Note>
    </Notes>
    <CVE>CVE-2021-47612</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47612.html</URL>
        <Description>CVE-2021-47612</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226585</URL>
        <Description>SUSE Bug 1226585</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/irdma: Fix a user-after-free in add_pble_prm

When irdma_hmc_sd_one fails, 'chunk' is freed while its still on the PBLE
info list.

Add the chunk entry to the PBLE info list only after successful setting of
the SD in irdma_hmc_sd_one.</Note>
    </Notes>
    <CVE>CVE-2021-47614</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47614.html</URL>
        <Description>CVE-2021-47614</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226601</URL>
        <Description>SUSE Bug 1226601</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.</Note>
    </Notes>
    <CVE>CVE-2021-47615</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47615.html</URL>
        <Description>CVE-2021-47615</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226602</URL>
        <Description>SUSE Bug 1226602</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA: Fix use-after-free in rxe_queue_cleanup

On error handling path in rxe_qp_from_init() qp-&gt;sq.queue is freed and
then rxe_create_qp() will drop last reference to this object. qp clean up
function will try to free this queue one time and it causes UAF bug.

Fix it by zeroing queue pointer after freeing queue in rxe_qp_from_init().</Note>
    </Notes>
    <CVE>CVE-2021-47616</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47616.html</URL>
        <Description>CVE-2021-47616</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226603</URL>
        <Description>SUSE Bug 1226603</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

PCI: pciehp: Fix infinite loop in IRQ handler upon power fault

The Power Fault Detected bit in the Slot Status register differs from
all other hotplug events in that it is sticky:  It can only be cleared
after turning off slot power.  Per PCIe r5.0, sec. 6.7.1.8:

  If a power controller detects a main power fault on the hot-plug slot,
  it must automatically set its internal main power fault latch [...].
  The main power fault latch is cleared when software turns off power to
  the hot-plug slot.

The stickiness used to cause interrupt storms and infinite loops which
were fixed in 2009 by commits 5651c48cfafe ("PCI pciehp: fix power fault
interrupt storm problem") and 99f0169c17f3 ("PCI: pciehp: enable
software notification on empty slots").

Unfortunately in 2020 the infinite loop issue was inadvertently
reintroduced by commit 8edf5332c393 ("PCI: pciehp: Fix MSI interrupt
race"):  The hardirq handler pciehp_isr() clears the PFD bit until
pciehp's power_fault_detected flag is set.  That happens in the IRQ
thread pciehp_ist(), which never learns of the event because the hardirq
handler is stuck in an infinite loop.  Fix by setting the
power_fault_detected flag already in the hardirq handler.</Note>
    </Notes>
    <CVE>CVE-2021-47617</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47617.html</URL>
        <Description>CVE-2021-47617</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226614</URL>
        <Description>SUSE Bug 1226614</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ARM: 9170/1: fix panic when kasan and kprobe are enabled

arm32 uses software to simulate the instruction replaced
by kprobe. some instructions may be simulated by constructing
assembly functions. therefore, before executing instruction
simulation, it is necessary to construct assembly function
execution environment in C language through binding registers.
after kasan is enabled, the register binding relationship will
be destroyed, resulting in instruction simulation errors and
causing kernel panic.

the kprobe emulate instruction function is distributed in three
files: actions-common.c actions-arm.c actions-thumb.c, so disable
KASAN when compiling these files.

for example, use kprobe insert on cap_capable+20 after kasan
enabled, the cap_capable assembly code is as follows:
&lt;cap_capable&gt;:
e92d47f0	push	{r4, r5, r6, r7, r8, r9, sl, lr}
e1a05000	mov	r5, r0
e280006c	add	r0, r0, #108    ; 0x6c
e1a04001	mov	r4, r1
e1a06002	mov	r6, r2
e59fa090	ldr	sl, [pc, #144]  ;
ebfc7bf8	bl	c03aa4b4 &lt;__asan_load4&gt;
e595706c	ldr	r7, [r5, #108]  ; 0x6c
e2859014	add	r9, r5, #20
......
The emulate_ldr assembly code after enabling kasan is as follows:
c06f1384 &lt;emulate_ldr&gt;:
e92d47f0	push	{r4, r5, r6, r7, r8, r9, sl, lr}
e282803c	add	r8, r2, #60     ; 0x3c
e1a05000	mov	r5, r0
e7e37855	ubfx	r7, r5, #16, #4
e1a00008	mov	r0, r8
e1a09001	mov	r9, r1
e1a04002	mov	r4, r2
ebf35462	bl	c03c6530 &lt;__asan_load4&gt;
e357000f	cmp	r7, #15
e7e36655	ubfx	r6, r5, #12, #4
e205a00f	and	sl, r5, #15
0a000001	beq	c06f13bc &lt;emulate_ldr+0x38&gt;
e0840107	add	r0, r4, r7, lsl #2
ebf3545c	bl	c03c6530 &lt;__asan_load4&gt;
e084010a	add	r0, r4, sl, lsl #2
ebf3545a	bl	c03c6530 &lt;__asan_load4&gt;
e2890010	add	r0, r9, #16
ebf35458	bl	c03c6530 &lt;__asan_load4&gt;
e5990010	ldr	r0, [r9, #16]
e12fff30	blx	r0
e356000f	cm	r6, #15
1a000014	bne	c06f1430 &lt;emulate_ldr+0xac&gt;
e1a06000	mov	r6, r0
e2840040	add	r0, r4, #64     ; 0x40
......

when running in emulate_ldr to simulate the ldr instruction, panic
occurred, and the log is as follows:
Unable to handle kernel NULL pointer dereference at virtual address
00000090
pgd = ecb46400
[00000090] *pgd=2e0fa003, *pmd=00000000
Internal error: Oops: 206 [#1] SMP ARM
PC is at cap_capable+0x14/0xb0
LR is at emulate_ldr+0x50/0xc0
psr: 600d0293 sp : ecd63af8  ip : 00000004  fp : c0a7c30c
r10: 00000000  r9 : c30897f4  r8 : ecd63cd4
r7 : 0000000f  r6 : 0000000a  r5 : e59fa090  r4 : ecd63c98
r3 : c06ae294  r2 : 00000000  r1 : b7611300  r0 : bf4ec008
Flags: nZCv  IRQs off  FIQs on  Mode SVC_32  ISA ARM  Segment user
Control: 32c5387d  Table: 2d546400  DAC: 55555555
Process bash (pid: 1643, stack limit = 0xecd60190)
(cap_capable) from (kprobe_handler+0x218/0x340)
(kprobe_handler) from (kprobe_trap_handler+0x24/0x48)
(kprobe_trap_handler) from (do_undefinstr+0x13c/0x364)
(do_undefinstr) from (__und_svc_finish+0x0/0x30)
(__und_svc_finish) from (cap_capable+0x18/0xb0)
(cap_capable) from (cap_vm_enough_memory+0x38/0x48)
(cap_vm_enough_memory) from
(security_vm_enough_memory_mm+0x48/0x6c)
(security_vm_enough_memory_mm) from
(copy_process.constprop.5+0x16b4/0x25c8)
(copy_process.constprop.5) from (_do_fork+0xe8/0x55c)
(_do_fork) from (SyS_clone+0x1c/0x24)
(SyS_clone) from (__sys_trace_return+0x0/0x10)
Code: 0050a0e1 6c0080e2 0140a0e1 0260a0e1 (f801f0e7)</Note>
    </Notes>
    <CVE>CVE-2021-47618</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47618.html</URL>
        <Description>CVE-2021-47618</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226644</URL>
        <Description>SUSE Bug 1226644</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

i40e: Fix queues reservation for XDP

When XDP was configured on a system with large number of CPUs
and X722 NIC there was a call trace with NULL pointer dereference.

i40e 0000:87:00.0: failed to get tracking for 256 queues for VSI 0 err -12
i40e 0000:87:00.0: setup of MAIN VSI failed

BUG: kernel NULL pointer dereference, address: 0000000000000000
RIP: 0010:i40e_xdp+0xea/0x1b0 [i40e]
Call Trace:
? i40e_reconfig_rss_queues+0x130/0x130 [i40e]
dev_xdp_install+0x61/0xe0
dev_xdp_attach+0x18a/0x4c0
dev_change_xdp_fd+0x1e6/0x220
do_setlink+0x616/0x1030
? ahci_port_stop+0x80/0x80
? ata_qc_issue+0x107/0x1e0
? lock_timer_base+0x61/0x80
? __mod_timer+0x202/0x380
rtnl_setlink+0xe5/0x170
? bpf_lsm_binder_transaction+0x10/0x10
? security_capable+0x36/0x50
rtnetlink_rcv_msg+0x121/0x350
? rtnl_calcit.isra.0+0x100/0x100
netlink_rcv_skb+0x50/0xf0
netlink_unicast+0x1d3/0x2a0
netlink_sendmsg+0x22a/0x440
sock_sendmsg+0x5e/0x60
__sys_sendto+0xf0/0x160
? __sys_getsockname+0x7e/0xc0
? _copy_from_user+0x3c/0x80
? __sys_setsockopt+0xc8/0x1a0
__x64_sys_sendto+0x20/0x30
do_syscall_64+0x33/0x40
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f83fa7a39e0

This was caused by PF queue pile fragmentation due to
flow director VSI queue being placed right after main VSI.
Because of this main VSI was not able to resize its
queue allocation for XDP resulting in no queues allocated
for main VSI when XDP was turned on.

Fix this by always allocating last queue in PF queue pile
for a flow director VSI.</Note>
    </Notes>
    <CVE>CVE-2021-47619</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47619.html</URL>
        <Description>CVE-2021-47619</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226645</URL>
        <Description>SUSE Bug 1226645</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: refactor malicious adv data check

Check for out-of-bound read was being performed at the end of while
num_reports loop, and would fill journal with false positives. Added
check to beginning of loop processing so that it doesn't get checked
after ptr has been advanced.</Note>
    </Notes>
    <CVE>CVE-2021-47620</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47620.html</URL>
        <Description>CVE-2021-47620</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226669</URL>
        <Description>SUSE Bug 1226669</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tipc: improve size validations for received domain records

The function tipc_mon_rcv() allows a node to receive and process
domain_record structs from peer nodes to track their views of the
network topology.

This patch verifies that the number of members in a received domain
record does not exceed the limit defined by MAX_MON_DOMAIN, something
that may otherwise lead to a stack overflow.

tipc_mon_rcv() is called from the function tipc_link_proto_rcv(), where
we are reading a 32 bit message data length field into a uint16.  To
avert any risk of bit overflow, we add an extra sanity check for this in
that function.  We cannot see that happen with the current code, but
future designers being unaware of this risk, may introduce it by
allowing delivery of very large (&gt; 64k) sk buffers from the bearer
layer.  This potential problem was identified by Eric Dumazet.

This fixes CVE-2022-0435</Note>
    </Notes>
    <CVE>CVE-2022-48711</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48711.html</URL>
        <Description>CVE-2022-48711</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226672</URL>
        <Description>SUSE Bug 1226672</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227473</URL>
        <Description>SUSE Bug 1227473</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ext4: fix error handling in ext4_fc_record_modified_inode()

Current code does not fully takes care of krealloc() error case, which
could lead to silent memory corruption or a kernel bug.  This patch
fixes that.

Also it cleans up some duplicated error handling logic from various
functions in fast_commit.c file.</Note>
    </Notes>
    <CVE>CVE-2022-48712</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48712.html</URL>
        <Description>CVE-2022-48712</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226673</URL>
        <Description>SUSE Bug 1226673</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

perf/x86/intel/pt: Fix crash with stop filters in single-range mode

Add a check for !buf-&gt;single before calling pt_buffer_region_size in a
place where a missing check can cause a kernel crash.

Fixes a bug introduced by commit 670638477aed ("perf/x86/intel/pt:
Opportunistically use single range output mode"), which added a
support for PT single-range output mode. Since that commit if a PT
stop filter range is hit while tracing, the kernel will crash because
of a null pointer dereference in pt_handle_status due to calling
pt_buffer_region_size without a ToPA configured.

The commit which introduced single-range mode guarded almost all uses of
the ToPA buffer variables with checks of the buf-&gt;single variable, but
missed the case where tracing was stopped by the PT hardware, which
happens when execution hits a configured stop filter.

Tested that hitting a stop filter while PT recording successfully
records a trace with this patch but crashes without this patch.</Note>
    </Notes>
    <CVE>CVE-2022-48713</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48713.html</URL>
        <Description>CVE-2022-48713</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227549</URL>
        <Description>SUSE Bug 1227549</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bpf: Use VM_MAP instead of VM_ALLOC for ringbuf

After commit 2fd3fb0be1d1 ("kasan, vmalloc: unpoison VM_ALLOC pages
after mapping"), non-VM_ALLOC mappings will be marked as accessible
in __get_vm_area_node() when KASAN is enabled. But now the flag for
ringbuf area is VM_ALLOC, so KASAN will complain out-of-bound access
after vmap() returns. Because the ringbuf area is created by mapping
allocated pages, so use VM_MAP instead.

After the change, info in /proc/vmallocinfo also changes from
  [start]-[end]   24576 ringbuf_map_alloc+0x171/0x290 vmalloc user
to
  [start]-[end]   24576 ringbuf_map_alloc+0x171/0x290 vmap user</Note>
    </Notes>
    <CVE>CVE-2022-48714</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48714.html</URL>
        <Description>CVE-2022-48714</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226622</URL>
        <Description>SUSE Bug 1226622</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="50">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe

Running tests with a debug kernel shows that bnx2fc_recv_frame() is
modifying the per_cpu lport stats counters in a non-mpsafe way.  Just boot
a debug kernel and run the bnx2fc driver with the hardware enabled.

[ 1391.699147] BUG: using smp_processor_id() in preemptible [00000000] code: bnx2fc_
[ 1391.699160] caller is bnx2fc_recv_frame+0xbf9/0x1760 [bnx2fc]
[ 1391.699174] CPU: 2 PID: 4355 Comm: bnx2fc_l2_threa Kdump: loaded Tainted: G    B
[ 1391.699180] Hardware name: HP ProLiant DL120 G7, BIOS J01 07/01/2013
[ 1391.699183] Call Trace:
[ 1391.699188]  dump_stack_lvl+0x57/0x7d
[ 1391.699198]  check_preemption_disabled+0xc8/0xd0
[ 1391.699205]  bnx2fc_recv_frame+0xbf9/0x1760 [bnx2fc]
[ 1391.699215]  ? do_raw_spin_trylock+0xb5/0x180
[ 1391.699221]  ? bnx2fc_npiv_create_vports.isra.0+0x4e0/0x4e0 [bnx2fc]
[ 1391.699229]  ? bnx2fc_l2_rcv_thread+0xb7/0x3a0 [bnx2fc]
[ 1391.699240]  bnx2fc_l2_rcv_thread+0x1af/0x3a0 [bnx2fc]
[ 1391.699250]  ? bnx2fc_ulp_init+0xc0/0xc0 [bnx2fc]
[ 1391.699258]  kthread+0x364/0x420
[ 1391.699263]  ? _raw_spin_unlock_irq+0x24/0x50
[ 1391.699268]  ? set_kthread_struct+0x100/0x100
[ 1391.699273]  ret_from_fork+0x22/0x30

Restore the old get_cpu/put_cpu code with some modifications to reduce the
size of the critical section.</Note>
    </Notes>
    <CVE>CVE-2022-48715</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48715.html</URL>
        <Description>CVE-2022-48715</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226621</URL>
        <Description>SUSE Bug 1226621</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="51">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ASoC: codecs: wcd938x: fix incorrect used of portid

Mixer controls have the channel id in mixer-&gt;reg, which is not same
as port id. port id should be derived from chan_info array.
So fix this. Without this, its possible that we could corrupt
struct wcd938x_sdw_priv by accessing port_map array out of range
with channel id instead of port id.</Note>
    </Notes>
    <CVE>CVE-2022-48716</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48716.html</URL>
        <Description>CVE-2022-48716</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226678</URL>
        <Description>SUSE Bug 1226678</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="52">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ASoC: max9759: fix underflow in speaker_gain_control_put()

Check for negative values of "priv-&gt;gain" to prevent an out of bounds
access.  The concern is that these might come from the user via:
  -&gt; snd_ctl_elem_write_user()
    -&gt; snd_ctl_elem_write()
      -&gt; kctl-&gt;put()</Note>
    </Notes>
    <CVE>CVE-2022-48717</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48717.html</URL>
        <Description>CVE-2022-48717</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226679</URL>
        <Description>SUSE Bug 1226679</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="53">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm: mxsfb: Fix NULL pointer dereference

mxsfb should not ever dereference the NULL pointer which
drm_atomic_get_new_bridge_state is allowed to return.
Assume a fixed format instead.</Note>
    </Notes>
    <CVE>CVE-2022-48718</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48718.html</URL>
        <Description>CVE-2022-48718</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226616</URL>
        <Description>SUSE Bug 1226616</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="54">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: macsec: Fix offload support for NETDEV_UNREGISTER event

Current macsec netdev notify handler handles NETDEV_UNREGISTER event by
releasing relevant SW resources only, this causes resources leak in case
of macsec HW offload, as the underlay driver was not notified to clean
it's macsec offload resources.

Fix by calling the underlay driver to clean it's relevant resources
by moving offload handling from macsec_dellink() to macsec_common_dellink()
when handling NETDEV_UNREGISTER event.</Note>
    </Notes>
    <CVE>CVE-2022-48720</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48720.html</URL>
        <Description>CVE-2022-48720</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226683</URL>
        <Description>SUSE Bug 1226683</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="55">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/smc: Forward wakeup to smc socket waitqueue after fallback

When we replace TCP with SMC and a fallback occurs, there may be
some socket waitqueue entries remaining in smc socket-&gt;wq, such
as eppoll_entries inserted by userspace applications.

After the fallback, data flows over TCP/IP and only clcsocket-&gt;wq
will be woken up. Applications can't be notified by the entries
which were inserted in smc socket-&gt;wq before fallback. So we need
a mechanism to wake up smc socket-&gt;wq at the same time if some
entries remaining in it.

The current workaround is to transfer the entries from smc socket-&gt;wq
to clcsock-&gt;wq during the fallback. But this may cause a crash
like this:

 general protection fault, probably for non-canonical address 0xdead000000000100: 0000 [#1] PREEMPT SMP PTI
 CPU: 3 PID: 0 Comm: swapper/3 Kdump: loaded Tainted: G E     5.16.0+ #107
 RIP: 0010:__wake_up_common+0x65/0x170
 Call Trace:
  &lt;IRQ&gt;
  __wake_up_common_lock+0x7a/0xc0
  sock_def_readable+0x3c/0x70
  tcp_data_queue+0x4a7/0xc40
  tcp_rcv_established+0x32f/0x660
  ? sk_filter_trim_cap+0xcb/0x2e0
  tcp_v4_do_rcv+0x10b/0x260
  tcp_v4_rcv+0xd2a/0xde0
  ip_protocol_deliver_rcu+0x3b/0x1d0
  ip_local_deliver_finish+0x54/0x60
  ip_local_deliver+0x6a/0x110
  ? tcp_v4_early_demux+0xa2/0x140
  ? tcp_v4_early_demux+0x10d/0x140
  ip_sublist_rcv_finish+0x49/0x60
  ip_sublist_rcv+0x19d/0x230
  ip_list_rcv+0x13e/0x170
  __netif_receive_skb_list_core+0x1c2/0x240
  netif_receive_skb_list_internal+0x1e6/0x320
  napi_complete_done+0x11d/0x190
  mlx5e_napi_poll+0x163/0x6b0 [mlx5_core]
  __napi_poll+0x3c/0x1b0
  net_rx_action+0x27c/0x300
  __do_softirq+0x114/0x2d2
  irq_exit_rcu+0xb4/0xe0
  common_interrupt+0xba/0xe0
  &lt;/IRQ&gt;
  &lt;TASK&gt;

The crash is caused by privately transferring waitqueue entries from
smc socket-&gt;wq to clcsock-&gt;wq. The owners of these entries, such as
epoll, have no idea that the entries have been transferred to a
different socket wait queue and still use original waitqueue spinlock
(smc socket-&gt;wq.wait.lock) to make the entries operation exclusive,
but it doesn't work. The operations to the entries, such as removing
from the waitqueue (now is clcsock-&gt;wq after fallback), may cause a
crash when clcsock waitqueue is being iterated over at the moment.

This patch tries to fix this by no longer transferring wait queue
entries privately, but introducing own implementations of clcsock's
callback functions in fallback situation. The callback functions will
forward the wakeup to smc socket-&gt;wq if clcsock-&gt;wq is actually woken
up and smc socket-&gt;wq has remaining entries.</Note>
    </Notes>
    <CVE>CVE-2022-48721</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48721.html</URL>
        <Description>CVE-2022-48721</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226685</URL>
        <Description>SUSE Bug 1226685</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="56">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: ieee802154: ca8210: Stop leaking skb's

Upon error the ieee802154_xmit_complete() helper is not called. Only
ieee802154_wake_queue() is called manually. We then leak the skb
structure.

Free the skb structure upon error before returning.</Note>
    </Notes>
    <CVE>CVE-2022-48722</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48722.html</URL>
        <Description>CVE-2022-48722</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226619</URL>
        <Description>SUSE Bug 1226619</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="57">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

spi: uniphier: fix reference count leak in uniphier_spi_probe()

The issue happens in several error paths in uniphier_spi_probe().
When either dma_get_slave_caps() or devm_spi_register_master() returns
an error code, the function forgets to decrease the refcount of both
`dma_rx` and `dma_tx` objects, which may lead to refcount leaks.

Fix it by decrementing the reference count of specific objects in
those error paths.</Note>
    </Notes>
    <CVE>CVE-2022-48723</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48723.html</URL>
        <Description>CVE-2022-48723</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226617</URL>
        <Description>SUSE Bug 1226617</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="58">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping()

After commit e3beca48a45b ("irqdomain/treewide: Keep firmware node
unconditionally allocated"). For tear down scenario, fn is only freed
after fail to allocate ir_domain, though it also should be freed in case
dmar_enable_qi returns error.

Besides free fn, irq_domain and ir_msi_domain need to be removed as well
if intel_setup_irq_remapping fails to enable queued invalidation.

Improve the rewinding path by add out_free_ir_domain and out_free_fwnode
lables per Baolu's suggestion.</Note>
    </Notes>
    <CVE>CVE-2022-48724</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48724.html</URL>
        <Description>CVE-2022-48724</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226624</URL>
        <Description>SUSE Bug 1226624</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="59">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/siw: Fix refcounting leak in siw_create_qp()

The atomic_inc() needs to be paired with an atomic_dec() on the error
path.</Note>
    </Notes>
    <CVE>CVE-2022-48725</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48725.html</URL>
        <Description>CVE-2022-48725</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226618</URL>
        <Description>SUSE Bug 1226618</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="60">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/ucma: Protect mc during concurrent multicast leaves

Partially revert the commit mentioned in the Fixes line to make sure that
allocation and erasing multicast struct are locked.

  BUG: KASAN: use-after-free in ucma_cleanup_multicast drivers/infiniband/core/ucma.c:491 [inline]
  BUG: KASAN: use-after-free in ucma_destroy_private_ctx+0x914/0xb70 drivers/infiniband/core/ucma.c:579
  Read of size 8 at addr ffff88801bb74b00 by task syz-executor.1/25529
  CPU: 0 PID: 25529 Comm: syz-executor.1 Not tainted 5.16.0-rc7-syzkaller #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
  Call Trace:
   __dump_stack lib/dump_stack.c:88 [inline]
   dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
   print_address_description.constprop.0.cold+0x8d/0x320 mm/kasan/report.c:247
   __kasan_report mm/kasan/report.c:433 [inline]
   kasan_report.cold+0x83/0xdf mm/kasan/report.c:450
   ucma_cleanup_multicast drivers/infiniband/core/ucma.c:491 [inline]
   ucma_destroy_private_ctx+0x914/0xb70 drivers/infiniband/core/ucma.c:579
   ucma_destroy_id+0x1e6/0x280 drivers/infiniband/core/ucma.c:614
   ucma_write+0x25c/0x350 drivers/infiniband/core/ucma.c:1732
   vfs_write+0x28e/0xae0 fs/read_write.c:588
   ksys_write+0x1ee/0x250 fs/read_write.c:643
   do_syscall_x64 arch/x86/entry/common.c:50 [inline]
   do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
   entry_SYSCALL_64_after_hwframe+0x44/0xae

Currently the xarray search can touch a concurrently freeing mc as the
xa_for_each() is not surrounded by any lock. Rather than hold the lock for
a full scan hold it only for the effected items, which is usually an empty
list.</Note>
    </Notes>
    <CVE>CVE-2022-48726</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48726.html</URL>
        <Description>CVE-2022-48726</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226686</URL>
        <Description>SUSE Bug 1226686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227552</URL>
        <Description>SUSE Bug 1227552</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="61">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: Avoid consuming a stale esr value when SError occur

When any exception other than an IRQ occurs, the CPU updates the ESR_EL2
register with the exception syndrome. An SError may also become pending,
and will be synchronised by KVM. KVM notes the exception type, and whether
an SError was synchronised in exit_code.

When an exception other than an IRQ occurs, fixup_guest_exit() updates
vcpu-&gt;arch.fault.esr_el2 from the hardware register. When an SError was
synchronised, the vcpu esr value is used to determine if the exception
was due to an HVC. If so, ELR_EL2 is moved back one instruction. This
is so that KVM can process the SError first, and re-execute the HVC if
the guest survives the SError.

But if an IRQ synchronises an SError, the vcpu's esr value is stale.
If the previous non-IRQ exception was an HVC, KVM will corrupt ELR_EL2,
causing an unrelated guest instruction to be executed twice.

Check ARM_EXCEPTION_CODE() before messing with ELR_EL2, IRQs don't
update this register so don't need to check.</Note>
    </Notes>
    <CVE>CVE-2022-48727</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48727.html</URL>
        <Description>CVE-2022-48727</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226690</URL>
        <Description>SUSE Bug 1226690</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="62">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

IB/hfi1: Fix AIP early init panic

An early failure in hfi1_ipoib_setup_rn() can lead to the following panic:

  BUG: unable to handle kernel NULL pointer dereference at 00000000000001b0
  PGD 0 P4D 0
  Oops: 0002 [#1] SMP NOPTI
  Workqueue: events work_for_cpu_fn
  RIP: 0010:try_to_grab_pending+0x2b/0x140
  Code: 1f 44 00 00 41 55 41 54 55 48 89 d5 53 48 89 fb 9c 58 0f 1f 44 00 00 48 89 c2 fa 66 0f 1f 44 00 00 48 89 55 00 40 84 f6 75 77 &lt;f0&gt; 48 0f ba 2b 00 72 09 31 c0 5b 5d 41 5c 41 5d c3 48 89 df e8 6c
  RSP: 0018:ffffb6b3cf7cfa48 EFLAGS: 00010046
  RAX: 0000000000000246 RBX: 00000000000001b0 RCX: 0000000000000000
  RDX: 0000000000000246 RSI: 0000000000000000 RDI: 00000000000001b0
  RBP: ffffb6b3cf7cfa70 R08: 0000000000000f09 R09: 0000000000000001
  R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000
  R13: ffffb6b3cf7cfa90 R14: ffffffff9b2fbfc0 R15: ffff8a4fdf244690
  FS:  0000000000000000(0000) GS:ffff8a527f400000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00000000000001b0 CR3: 00000017e2410003 CR4: 00000000007706f0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  PKRU: 55555554
  Call Trace:
   __cancel_work_timer+0x42/0x190
   ? dev_printk_emit+0x4e/0x70
   iowait_cancel_work+0x15/0x30 [hfi1]
   hfi1_ipoib_txreq_deinit+0x5a/0x220 [hfi1]
   ? dev_err+0x6c/0x90
   hfi1_ipoib_netdev_dtor+0x15/0x30 [hfi1]
   hfi1_ipoib_setup_rn+0x10e/0x150 [hfi1]
   rdma_init_netdev+0x5a/0x80 [ib_core]
   ? hfi1_ipoib_free_rdma_netdev+0x20/0x20 [hfi1]
   ipoib_intf_init+0x6c/0x350 [ib_ipoib]
   ipoib_intf_alloc+0x5c/0xc0 [ib_ipoib]
   ipoib_add_one+0xbe/0x300 [ib_ipoib]
   add_client_context+0x12c/0x1a0 [ib_core]
   enable_device_and_get+0xdc/0x1d0 [ib_core]
   ib_register_device+0x572/0x6b0 [ib_core]
   rvt_register_device+0x11b/0x220 [rdmavt]
   hfi1_register_ib_device+0x6b4/0x770 [hfi1]
   do_init_one.isra.20+0x3e3/0x680 [hfi1]
   local_pci_probe+0x41/0x90
   work_for_cpu_fn+0x16/0x20
   process_one_work+0x1a7/0x360
   ? create_worker+0x1a0/0x1a0
   worker_thread+0x1cf/0x390
   ? create_worker+0x1a0/0x1a0
   kthread+0x116/0x130
   ? kthread_flush_work_fn+0x10/0x10
   ret_from_fork+0x1f/0x40

The panic happens in hfi1_ipoib_txreq_deinit() because there is a NULL
deref when hfi1_ipoib_netdev_dtor() is called in this error case.

hfi1_ipoib_txreq_init() and hfi1_ipoib_rxq_init() are self unwinding so
fix by adjusting the error paths accordingly.

Other changes:
- hfi1_ipoib_free_rdma_netdev() is deleted including the free_netdev()
  since the netdev core code deletes calls free_netdev()
- The switch to the accelerated entrances is moved to the success path.</Note>
    </Notes>
    <CVE>CVE-2022-48728</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48728.html</URL>
        <Description>CVE-2022-48728</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226691</URL>
        <Description>SUSE Bug 1226691</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="63">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

IB/hfi1: Fix panic with larger ipoib send_queue_size

When the ipoib send_queue_size is increased from the default the following
panic happens:

  RIP: 0010:hfi1_ipoib_drain_tx_ring+0x45/0xf0 [hfi1]
  Code: 31 e4 eb 0f 8b 85 c8 02 00 00 41 83 c4 01 44 39 e0 76 60 8b 8d cc 02 00 00 44 89 e3 be 01 00 00 00 d3 e3 48 03 9d c0 02 00 00 &lt;c7&gt; 83 18 01 00 00 00 00 00 00 48 8b bb 30 01 00 00 e8 25 af a7 e0
  RSP: 0018:ffffc9000798f4a0 EFLAGS: 00010286
  RAX: 0000000000008000 RBX: ffffc9000aa0f000 RCX: 000000000000000f
  RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
  RBP: ffff88810ff08000 R08: ffff88889476d900 R09: 0000000000000101
  R10: 0000000000000000 R11: ffffc90006590ff8 R12: 0000000000000200
  R13: ffffc9000798fba8 R14: 0000000000000000 R15: 0000000000000001
  FS:  00007fd0f79cc3c0(0000) GS:ffff88885fb00000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: ffffc9000aa0f118 CR3: 0000000889c84001 CR4: 00000000001706e0
  Call Trace:
   &lt;TASK&gt;
   hfi1_ipoib_napi_tx_disable+0x45/0x60 [hfi1]
   hfi1_ipoib_dev_stop+0x18/0x80 [hfi1]
   ipoib_ib_dev_stop+0x1d/0x40 [ib_ipoib]
   ipoib_stop+0x48/0xc0 [ib_ipoib]
   __dev_close_many+0x9e/0x110
   __dev_change_flags+0xd9/0x210
   dev_change_flags+0x21/0x60
   do_setlink+0x31c/0x10f0
   ? __nla_validate_parse+0x12d/0x1a0
   ? __nla_parse+0x21/0x30
   ? inet6_validate_link_af+0x5e/0xf0
   ? cpumask_next+0x1f/0x20
   ? __snmp6_fill_stats64.isra.53+0xbb/0x140
   ? __nla_validate_parse+0x47/0x1a0
   __rtnl_newlink+0x530/0x910
   ? pskb_expand_head+0x73/0x300
   ? __kmalloc_node_track_caller+0x109/0x280
   ? __nla_put+0xc/0x20
   ? cpumask_next_and+0x20/0x30
   ? update_sd_lb_stats.constprop.144+0xd3/0x820
   ? _raw_spin_unlock_irqrestore+0x25/0x37
   ? __wake_up_common_lock+0x87/0xc0
   ? kmem_cache_alloc_trace+0x3d/0x3d0
   rtnl_newlink+0x43/0x60

The issue happens when the shift that should have been a function of the
txq item size mistakenly used the ring size.

Fix by using the item size.</Note>
    </Notes>
    <CVE>CVE-2022-48729</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48729.html</URL>
        <Description>CVE-2022-48729</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226710</URL>
        <Description>SUSE Bug 1226710</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="64">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

dma-buf: heaps: Fix potential spectre v1 gadget

It appears like nr could be a Spectre v1 gadget as it's supplied by a
user and used as an array index. Prevent the contents
of kernel memory from being leaked to userspace via speculative
execution by using array_index_nospec.

 [sumits: added fixes and cc: stable tags]</Note>
    </Notes>
    <CVE>CVE-2022-48730</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48730.html</URL>
        <Description>CVE-2022-48730</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226713</URL>
        <Description>SUSE Bug 1226713</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="65">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau: fix off by one in BIOS boundary checking

Bounds checking when parsing init scripts embedded in the BIOS reject
access to the last byte. This causes driver initialization to fail on
Apple eMac's with GeForce 2 MX GPUs, leaving the system with no working
console.

This is probably only seen on OpenFirmware machines like PowerPC Macs
because the BIOS image provided by OF is only the used parts of the ROM,
not a power-of-two blocks read from PCI directly so PCs always have
empty bytes at the end that are never accessed.</Note>
    </Notes>
    <CVE>CVE-2022-48732</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48732.html</URL>
        <Description>CVE-2022-48732</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226716</URL>
        <Description>SUSE Bug 1226716</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="66">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix use-after-free after failure to create a snapshot

At ioctl.c:create_snapshot(), we allocate a pending snapshot structure and
then attach it to the transaction's list of pending snapshots. After that
we call btrfs_commit_transaction(), and if that returns an error we jump
to 'fail' label, where we kfree() the pending snapshot structure. This can
result in a later use-after-free of the pending snapshot:

1) We allocated the pending snapshot and added it to the transaction's
   list of pending snapshots;

2) We call btrfs_commit_transaction(), and it fails either at the first
   call to btrfs_run_delayed_refs() or btrfs_start_dirty_block_groups().
   In both cases, we don't abort the transaction and we release our
   transaction handle. We jump to the 'fail' label and free the pending
   snapshot structure. We return with the pending snapshot still in the
   transaction's list;

3) Another task commits the transaction. This time there's no error at
   all, and then during the transaction commit it accesses a pointer
   to the pending snapshot structure that the snapshot creation task
   has already freed, resulting in a user-after-free.

This issue could actually be detected by smatch, which produced the
following warning:

  fs/btrfs/ioctl.c:843 create_snapshot() warn: '&amp;pending_snapshot-&gt;list' not removed from list

So fix this by not having the snapshot creation ioctl directly add the
pending snapshot to the transaction's list. Instead add the pending
snapshot to the transaction handle, and then at btrfs_commit_transaction()
we add the snapshot to the list only when we can guarantee that any error
returned after that point will result in a transaction abort, in which
case the ioctl code can safely free the pending snapshot and no one can
access it anymore.</Note>
    </Notes>
    <CVE>CVE-2022-48733</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48733.html</URL>
        <Description>CVE-2022-48733</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226718</URL>
        <Description>SUSE Bug 1226718</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="67">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix deadlock between quota disable and qgroup rescan worker

Quota disable ioctl starts a transaction before waiting for the qgroup
rescan worker completes. However, this wait can be infinite and results
in deadlock because of circular dependency among the quota disable
ioctl, the qgroup rescan worker and the other task with transaction such
as block group relocation task.

The deadlock happens with the steps following:

1) Task A calls ioctl to disable quota. It starts a transaction and
   waits for qgroup rescan worker completes.
2) Task B such as block group relocation task starts a transaction and
   joins to the transaction that task A started. Then task B commits to
   the transaction. In this commit, task B waits for a commit by task A.
3) Task C as the qgroup rescan worker starts its job and starts a
   transaction. In this transaction start, task C waits for completion
   of the transaction that task A started and task B committed.

This deadlock was found with fstests test case btrfs/115 and a zoned
null_blk device. The test case enables and disables quota, and the
block group reclaim was triggered during the quota disable by chance.
The deadlock was also observed by running quota enable and disable in
parallel with 'btrfs balance' command on regular null_blk devices.

An example report of the deadlock:

  [372.469894] INFO: task kworker/u16:6:103 blocked for more than 122 seconds.
  [372.479944]       Not tainted 5.16.0-rc8 #7
  [372.485067] "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
  [372.493898] task:kworker/u16:6   state:D stack:    0 pid:  103 ppid:     2 flags:0x00004000
  [372.503285] Workqueue: btrfs-qgroup-rescan btrfs_work_helper [btrfs]
  [372.510782] Call Trace:
  [372.514092]  &lt;TASK&gt;
  [372.521684]  __schedule+0xb56/0x4850
  [372.530104]  ? io_schedule_timeout+0x190/0x190
  [372.538842]  ? lockdep_hardirqs_on+0x7e/0x100
  [372.547092]  ? _raw_spin_unlock_irqrestore+0x3e/0x60
  [372.555591]  schedule+0xe0/0x270
  [372.561894]  btrfs_commit_transaction+0x18bb/0x2610 [btrfs]
  [372.570506]  ? btrfs_apply_pending_changes+0x50/0x50 [btrfs]
  [372.578875]  ? free_unref_page+0x3f2/0x650
  [372.585484]  ? finish_wait+0x270/0x270
  [372.591594]  ? release_extent_buffer+0x224/0x420 [btrfs]
  [372.599264]  btrfs_qgroup_rescan_worker+0xc13/0x10c0 [btrfs]
  [372.607157]  ? lock_release+0x3a9/0x6d0
  [372.613054]  ? btrfs_qgroup_account_extent+0xda0/0xda0 [btrfs]
  [372.620960]  ? do_raw_spin_lock+0x11e/0x250
  [372.627137]  ? rwlock_bug.part.0+0x90/0x90
  [372.633215]  ? lock_is_held_type+0xe4/0x140
  [372.639404]  btrfs_work_helper+0x1ae/0xa90 [btrfs]
  [372.646268]  process_one_work+0x7e9/0x1320
  [372.652321]  ? lock_release+0x6d0/0x6d0
  [372.658081]  ? pwq_dec_nr_in_flight+0x230/0x230
  [372.664513]  ? rwlock_bug.part.0+0x90/0x90
  [372.670529]  worker_thread+0x59e/0xf90
  [372.676172]  ? process_one_work+0x1320/0x1320
  [372.682440]  kthread+0x3b9/0x490
  [372.687550]  ? _raw_spin_unlock_irq+0x24/0x50
  [372.693811]  ? set_kthread_struct+0x100/0x100
  [372.700052]  ret_from_fork+0x22/0x30
  [372.705517]  &lt;/TASK&gt;
  [372.709747] INFO: task btrfs-transacti:2347 blocked for more than 123 seconds.
  [372.729827]       Not tainted 5.16.0-rc8 #7
  [372.745907] "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
  [372.767106] task:btrfs-transacti state:D stack:    0 pid: 2347 ppid:     2 flags:0x00004000
  [372.787776] Call Trace:
  [372.801652]  &lt;TASK&gt;
  [372.812961]  __schedule+0xb56/0x4850
  [372.830011]  ? io_schedule_timeout+0x190/0x190
  [372.852547]  ? lockdep_hardirqs_on+0x7e/0x100
  [372.871761]  ? _raw_spin_unlock_irqrestore+0x3e/0x60
  [372.886792]  schedule+0xe0/0x270
  [372.901685]  wait_current_trans+0x22c/0x310 [btrfs]
  [372.919743]  ? btrfs_put_transaction+0x3d0/0x3d0 [btrfs]
  [372.938923]  ? finish_wait+0x270/0x270
  [372.959085]  ? join_transaction+0xc7
---truncated---</Note>
    </Notes>
    <CVE>CVE-2022-48734</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48734.html</URL>
        <Description>CVE-2022-48734</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226626</URL>
        <Description>SUSE Bug 1226626</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="68">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda: Fix UAF of leds class devs at unbinding

The LED class devices that are created by HD-audio codec drivers are
registered via devm_led_classdev_register() and associated with the
HD-audio codec device.  Unfortunately, it turned out that the devres
release doesn't work for this case; namely, since the codec resource
release happens before the devm call chain, it triggers a NULL
dereference or a UAF for a stale set_brightness_delay callback.

For fixing the bug, this patch changes the LED class device register
and unregister in a manual manner without devres, keeping the
instances in hda_gen_spec.</Note>
    </Notes>
    <CVE>CVE-2022-48735</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48735.html</URL>
        <Description>CVE-2022-48735</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226719</URL>
        <Description>SUSE Bug 1226719</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227438</URL>
        <Description>SUSE Bug 1227438</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="69">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.</Note>
    </Notes>
    <CVE>CVE-2022-48736</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48736.html</URL>
        <Description>CVE-2022-48736</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226721</URL>
        <Description>SUSE Bug 1226721</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="70">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.</Note>
    </Notes>
    <CVE>CVE-2022-48737</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48737.html</URL>
        <Description>CVE-2022-48737</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226762</URL>
        <Description>SUSE Bug 1226762</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="71">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ASoC: ops: Reject out of bounds values in snd_soc_put_volsw()

We don't currently validate that the values being set are within the range
we advertised to userspace as being valid, do so and reject any values
that are out of range.</Note>
    </Notes>
    <CVE>CVE-2022-48738</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48738.html</URL>
        <Description>CVE-2022-48738</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226674</URL>
        <Description>SUSE Bug 1226674</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="72">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ASoC: hdmi-codec: Fix OOB memory accesses

Correct size of iec_status array by changing it to the size of status
array of the struct snd_aes_iec958. This fixes out-of-bounds slab
read accesses made by memcpy() of the hdmi-codec driver. This problem
is reported by KASAN.</Note>
    </Notes>
    <CVE>CVE-2022-48739</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48739.html</URL>
        <Description>CVE-2022-48739</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226675</URL>
        <Description>SUSE Bug 1226675</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="73">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

selinux: fix double free of cond_list on error paths

On error path from cond_read_list() and duplicate_policydb_cond_list()
the cond_list_destroy() gets called a second time in caller functions,
resulting in NULL pointer deref.  Fix this by resetting the
cond_list_len to 0 in cond_list_destroy(), making subsequent calls a
noop.

Also consistently reset the cond_list pointer to NULL after freeing.

[PM: fix line lengths in the description]</Note>
    </Notes>
    <CVE>CVE-2022-48740</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48740.html</URL>
        <Description>CVE-2022-48740</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226699</URL>
        <Description>SUSE Bug 1226699</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="74">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: amd-xgbe: Fix skb data length underflow

There will be BUG_ON() triggered in include/linux/skbuff.h leading to
intermittent kernel panic, when the skb length underflow is detected.

Fix this by dropping the packet if such length underflows are seen
because of inconsistencies in the hardware descriptors.</Note>
    </Notes>
    <CVE>CVE-2022-48743</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48743.html</URL>
        <Description>CVE-2022-48743</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226705</URL>
        <Description>SUSE Bug 1226705</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="75">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Avoid field-overflowing memcpy()

In preparation for FORTIFY_SOURCE performing compile-time and run-time
field bounds checking for memcpy(), memmove(), and memset(), avoid
intentionally writing across neighboring fields.

Use flexible arrays instead of zero-element arrays (which look like they
are always overflowing) and split the cross-field memcpy() into two halves
that can be appropriately bounds-checked by the compiler.

We were doing:

	#define ETH_HLEN  14
	#define VLAN_HLEN  4
	...
	#define MLX5E_XDP_MIN_INLINE (ETH_HLEN + VLAN_HLEN)
	...
        struct mlx5e_tx_wqe      *wqe  = mlx5_wq_cyc_get_wqe(wq, pi);
	...
        struct mlx5_wqe_eth_seg  *eseg = &amp;wqe-&gt;eth;
        struct mlx5_wqe_data_seg *dseg = wqe-&gt;data;
	...
	memcpy(eseg-&gt;inline_hdr.start, xdptxd-&gt;data, MLX5E_XDP_MIN_INLINE);

target is wqe-&gt;eth.inline_hdr.start (which the compiler sees as being
2 bytes in size), but copying 18, intending to write across start
(really vlan_tci, 2 bytes). The remaining 16 bytes get written into
wqe-&gt;data[0], covering byte_count (4 bytes), lkey (4 bytes), and addr
(8 bytes).

struct mlx5e_tx_wqe {
        struct mlx5_wqe_ctrl_seg   ctrl;                 /*     0    16 */
        struct mlx5_wqe_eth_seg    eth;                  /*    16    16 */
        struct mlx5_wqe_data_seg   data[];               /*    32     0 */

        /* size: 32, cachelines: 1, members: 3 */
        /* last cacheline: 32 bytes */
};

struct mlx5_wqe_eth_seg {
        u8                         swp_outer_l4_offset;  /*     0     1 */
        u8                         swp_outer_l3_offset;  /*     1     1 */
        u8                         swp_inner_l4_offset;  /*     2     1 */
        u8                         swp_inner_l3_offset;  /*     3     1 */
        u8                         cs_flags;             /*     4     1 */
        u8                         swp_flags;            /*     5     1 */
        __be16                     mss;                  /*     6     2 */
        __be32                     flow_table_metadata;  /*     8     4 */
        union {
                struct {
                        __be16     sz;                   /*    12     2 */
                        u8         start[2];             /*    14     2 */
                } inline_hdr;                            /*    12     4 */
                struct {
                        __be16     type;                 /*    12     2 */
                        __be16     vlan_tci;             /*    14     2 */
                } insert;                                /*    12     4 */
                __be32             trailer;              /*    12     4 */
        };                                               /*    12     4 */

        /* size: 16, cachelines: 1, members: 9 */
        /* last cacheline: 16 bytes */
};

struct mlx5_wqe_data_seg {
        __be32                     byte_count;           /*     0     4 */
        __be32                     lkey;                 /*     4     4 */
        __be64                     addr;                 /*     8     8 */

        /* size: 16, cachelines: 1, members: 3 */
        /* last cacheline: 16 bytes */
};

So, split the memcpy() so the compiler can reason about the buffer
sizes.

"pahole" shows no size nor member offset changes to struct mlx5e_tx_wqe
nor struct mlx5e_umr_wqe. "objdump -d" shows no meaningful object
code changes (i.e. only source line number induced differences and
optimizations).</Note>
    </Notes>
    <CVE>CVE-2022-48744</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48744.html</URL>
        <Description>CVE-2022-48744</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226696</URL>
        <Description>SUSE Bug 1226696</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="76">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Use del_timer_sync in fw reset flow of halting poll

Substitute del_timer() with del_timer_sync() in fw reset polling
deactivation flow, in order to prevent a race condition which occurs
when del_timer() is called and timer is deactivated while another
process is handling the timer interrupt. A situation that led to
the following call trace:
	RIP: 0010:run_timer_softirq+0x137/0x420
	&lt;IRQ&gt;
	recalibrate_cpu_khz+0x10/0x10
	ktime_get+0x3e/0xa0
	? sched_clock_cpu+0xb/0xc0
	__do_softirq+0xf5/0x2ea
	irq_exit_rcu+0xc1/0xf0
	sysvec_apic_timer_interrupt+0x9e/0xc0
	asm_sysvec_apic_timer_interrupt+0x12/0x20
	&lt;/IRQ&gt;</Note>
    </Notes>
    <CVE>CVE-2022-48745</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48745.html</URL>
        <Description>CVE-2022-48745</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226702</URL>
        <Description>SUSE Bug 1226702</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="77">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix handling of wrong devices during bond netevent

Current implementation of bond netevent handler only check if
the handled netdev is VF representor and it missing a check if
the VF representor is on the same phys device of the bond handling
the netevent.

Fix by adding the missing check and optimizing the check if
the netdev is VF representor so it will not access uninitialized
private data and crashes.

BUG: kernel NULL pointer dereference, address: 000000000000036c
PGD 0 P4D 0
Oops: 0000 [#1] SMP NOPTI
Workqueue: eth3bond0 bond_mii_monitor [bonding]
RIP: 0010:mlx5e_is_uplink_rep+0xc/0x50 [mlx5_core]
RSP: 0018:ffff88812d69fd60 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffff8881cf800000 RCX: 0000000000000000
RDX: ffff88812d69fe10 RSI: 000000000000001b RDI: ffff8881cf800880
RBP: ffff8881cf800000 R08: 00000445cabccf2b R09: 0000000000000008
R10: 0000000000000004 R11: 0000000000000008 R12: ffff88812d69fe10
R13: 00000000fffffffe R14: ffff88820c0f9000 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff88846fb00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000000000036c CR3: 0000000103d80006 CR4: 0000000000370ea0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 mlx5e_eswitch_uplink_rep+0x31/0x40 [mlx5_core]
 mlx5e_rep_is_lag_netdev+0x94/0xc0 [mlx5_core]
 mlx5e_rep_esw_bond_netevent+0xeb/0x3d0 [mlx5_core]
 raw_notifier_call_chain+0x41/0x60
 call_netdevice_notifiers_info+0x34/0x80
 netdev_lower_state_changed+0x4e/0xa0
 bond_mii_monitor+0x56b/0x640 [bonding]
 process_one_work+0x1b9/0x390
 worker_thread+0x4d/0x3d0
 ? rescuer_thread+0x350/0x350
 kthread+0x124/0x150
 ? set_kthread_struct+0x40/0x40
 ret_from_fork+0x1f/0x30</Note>
    </Notes>
    <CVE>CVE-2022-48746</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48746.html</URL>
        <Description>CVE-2022-48746</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226703</URL>
        <Description>SUSE Bug 1226703</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="78">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

block: Fix wrong offset in bio_truncate()

bio_truncate() clears the buffer outside of last block of bdev, however
current bio_truncate() is using the wrong offset of page. So it can
return the uninitialized data.

This happened when both of truncated/corrupted FS and userspace (via
bdev) are trying to read the last of bdev.</Note>
    </Notes>
    <CVE>CVE-2022-48747</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48747.html</URL>
        <Description>CVE-2022-48747</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226643</URL>
        <Description>SUSE Bug 1226643</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="79">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: bridge: vlan: fix memory leak in __allowed_ingress

When using per-vlan state, if vlan snooping and stats are disabled,
untagged or priority-tagged ingress frame will go to check pvid state.
If the port state is forwarding and the pvid state is not
learning/forwarding, untagged or priority-tagged frame will be dropped
but skb memory is not freed.
Should free skb when __allowed_ingress returns false.</Note>
    </Notes>
    <CVE>CVE-2022-48748</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48748.html</URL>
        <Description>CVE-2022-48748</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226647</URL>
        <Description>SUSE Bug 1226647</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="80">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc

The function performs a check on the "ctx" input parameter, however, it
is used before the check.

Initialize the "base" variable after the sanity check to avoid a
possible NULL pointer dereference.

Addresses-Coverity-ID: 1493866 ("Null pointer dereference")</Note>
    </Notes>
    <CVE>CVE-2022-48749</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48749.html</URL>
        <Description>CVE-2022-48749</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226650</URL>
        <Description>SUSE Bug 1226650</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="81">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/smc: Transitional solution for clcsock race issue

We encountered a crash in smc_setsockopt() and it is caused by
accessing smc-&gt;clcsock after clcsock was released.

 BUG: kernel NULL pointer dereference, address: 0000000000000020
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: 0000 [#1] PREEMPT SMP PTI
 CPU: 1 PID: 50309 Comm: nginx Kdump: loaded Tainted: G E     5.16.0-rc4+ #53
 RIP: 0010:smc_setsockopt+0x59/0x280 [smc]
 Call Trace:
  &lt;TASK&gt;
  __sys_setsockopt+0xfc/0x190
  __x64_sys_setsockopt+0x20/0x30
  do_syscall_64+0x34/0x90
  entry_SYSCALL_64_after_hwframe+0x44/0xae
 RIP: 0033:0x7f16ba83918e
  &lt;/TASK&gt;

This patch tries to fix it by holding clcsock_release_lock and
checking whether clcsock has already been released before access.

In case that a crash of the same reason happens in smc_getsockopt()
or smc_switch_to_fallback(), this patch also checkes smc-&gt;clcsock
in them too. And the caller of smc_switch_to_fallback() will identify
whether fallback succeeds according to the return value.</Note>
    </Notes>
    <CVE>CVE-2022-48751</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48751.html</URL>
        <Description>CVE-2022-48751</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226653</URL>
        <Description>SUSE Bug 1226653</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="82">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending

Running selftest with CONFIG_PPC_IRQ_SOFT_MASK_DEBUG enabled in kernel
triggered below warning:

[  172.851380] ------------[ cut here ]------------
[  172.851391] WARNING: CPU: 8 PID: 2901 at arch/powerpc/include/asm/hw_irq.h:246 power_pmu_disable+0x270/0x280
[  172.851402] Modules linked in: dm_mod bonding nft_ct nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables rfkill nfnetlink sunrpc xfs libcrc32c pseries_rng xts vmx_crypto uio_pdrv_genirq uio sch_fq_codel ip_tables ext4 mbcache jbd2 sd_mod t10_pi sg ibmvscsi ibmveth scsi_transport_srp fuse
[  172.851442] CPU: 8 PID: 2901 Comm: lost_exception_ Not tainted 5.16.0-rc5-03218-g798527287598 #2
[  172.851451] NIP:  c00000000013d600 LR: c00000000013d5a4 CTR: c00000000013b180
[  172.851458] REGS: c000000017687860 TRAP: 0700   Not tainted  (5.16.0-rc5-03218-g798527287598)
[  172.851465] MSR:  8000000000029033 &lt;SF,EE,ME,IR,DR,RI,LE&gt;  CR: 48004884  XER: 20040000
[  172.851482] CFAR: c00000000013d5b4 IRQMASK: 1
[  172.851482] GPR00: c00000000013d5a4 c000000017687b00 c000000002a10600 0000000000000004
[  172.851482] GPR04: 0000000082004000 c0000008ba08f0a8 0000000000000000 00000008b7ed0000
[  172.851482] GPR08: 00000000446194f6 0000000000008000 c00000000013b118 c000000000d58e68
[  172.851482] GPR12: c00000000013d390 c00000001ec54a80 0000000000000000 0000000000000000
[  172.851482] GPR16: 0000000000000000 0000000000000000 c000000015d5c708 c0000000025396d0
[  172.851482] GPR20: 0000000000000000 0000000000000000 c00000000a3bbf40 0000000000000003
[  172.851482] GPR24: 0000000000000000 c0000008ba097400 c0000000161e0d00 c00000000a3bb600
[  172.851482] GPR28: c000000015d5c700 0000000000000001 0000000082384090 c0000008ba0020d8
[  172.851549] NIP [c00000000013d600] power_pmu_disable+0x270/0x280
[  172.851557] LR [c00000000013d5a4] power_pmu_disable+0x214/0x280
[  172.851565] Call Trace:
[  172.851568] [c000000017687b00] [c00000000013d5a4] power_pmu_disable+0x214/0x280 (unreliable)
[  172.851579] [c000000017687b40] [c0000000003403ac] perf_pmu_disable+0x4c/0x60
[  172.851588] [c000000017687b60] [c0000000003445e4] __perf_event_task_sched_out+0x1d4/0x660
[  172.851596] [c000000017687c50] [c000000000d1175c] __schedule+0xbcc/0x12a0
[  172.851602] [c000000017687d60] [c000000000d11ea8] schedule+0x78/0x140
[  172.851608] [c000000017687d90] [c0000000001a8080] sys_sched_yield+0x20/0x40
[  172.851615] [c000000017687db0] [c0000000000334dc] system_call_exception+0x18c/0x380
[  172.851622] [c000000017687e10] [c00000000000c74c] system_call_common+0xec/0x268

The warning indicates that MSR_EE being set(interrupt enabled) when
there was an overflown PMC detected. This could happen in
power_pmu_disable since it runs under interrupt soft disable
condition ( local_irq_save ) and not with interrupts hard disabled.
commit 2c9ac51b850d ("powerpc/perf: Fix PMU callbacks to clear
pending PMI before resetting an overflown PMC") intended to clear
PMI pending bit in Paca when disabling the PMU. It could happen
that PMC gets overflown while code is in power_pmu_disable
callback function. Hence add a check to see if PMI pending bit
is set in Paca before clearing it via clear_pmi_pending.</Note>
    </Notes>
    <CVE>CVE-2022-48752</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48752.html</URL>
        <Description>CVE-2022-48752</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226709</URL>
        <Description>SUSE Bug 1226709</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="83">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

block: fix memory leak in disk_register_independent_access_ranges

kobject_init_and_add() takes reference even when it fails.
According to the doc of kobject_init_and_add()

   If this function returns an error, kobject_put() must be called to
   properly clean up the memory associated with the object.

Fix this issue by adding kobject_put().
Callback function blk_ia_ranges_sysfs_release() in kobject_put()
can handle the pointer "iars" properly.</Note>
    </Notes>
    <CVE>CVE-2022-48753</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48753.html</URL>
        <Description>CVE-2022-48753</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226693</URL>
        <Description>SUSE Bug 1226693</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="84">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

phylib: fix potential use-after-free

Commit bafbdd527d56 ("phylib: Add device reset GPIO support") added call
to phy_device_reset(phydev) after the put_device() call in phy_detach().

The comment before the put_device() call says that the phydev might go
away with put_device().

Fix potential use-after-free by calling phy_device_reset() before
put_device().</Note>
    </Notes>
    <CVE>CVE-2022-48754</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48754.html</URL>
        <Description>CVE-2022-48754</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226692</URL>
        <Description>SUSE Bug 1226692</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="85">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

powerpc64/bpf: Limit 'ldbrx' to processors compliant with ISA v2.06

Johan reported the below crash with test_bpf on ppc64 e5500:

  test_bpf: #296 ALU_END_FROM_LE 64: 0x0123456789abcdef -&gt; 0x67452301 jited:1
  Oops: Exception in kernel mode, sig: 4 [#1]
  BE PAGE_SIZE=4K SMP NR_CPUS=24 QEMU e500
  Modules linked in: test_bpf(+)
  CPU: 0 PID: 76 Comm: insmod Not tainted 5.14.0-03771-g98c2059e008a-dirty #1
  NIP:  8000000000061c3c LR: 80000000006dea64 CTR: 8000000000061c18
  REGS: c0000000032d3420 TRAP: 0700   Not tainted (5.14.0-03771-g98c2059e008a-dirty)
  MSR:  0000000080089000 &lt;EE,ME&gt;  CR: 88002822  XER: 20000000 IRQMASK: 0
  &lt;...&gt;
  NIP [8000000000061c3c] 0x8000000000061c3c
  LR [80000000006dea64] .__run_one+0x104/0x17c [test_bpf]
  Call Trace:
   .__run_one+0x60/0x17c [test_bpf] (unreliable)
   .test_bpf_init+0x6a8/0xdc8 [test_bpf]
   .do_one_initcall+0x6c/0x28c
   .do_init_module+0x68/0x28c
   .load_module+0x2460/0x2abc
   .__do_sys_init_module+0x120/0x18c
   .system_call_exception+0x110/0x1b8
   system_call_common+0xf0/0x210
  --- interrupt: c00 at 0x101d0acc
  &lt;...&gt;
  ---[ end trace 47b2bf19090bb3d0 ]---

  Illegal instruction

The illegal instruction turned out to be 'ldbrx' emitted for
BPF_FROM_[L|B]E, which was only introduced in ISA v2.06. Guard use of
the same and implement an alternative approach for older processors.</Note>
    </Notes>
    <CVE>CVE-2022-48755</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48755.html</URL>
        <Description>CVE-2022-48755</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226706</URL>
        <Description>SUSE Bug 1226706</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="86">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable

The function performs a check on the "phy" input parameter, however, it
is used before the check.

Initialize the "dev" variable after the sanity check to avoid a possible
NULL pointer dereference.

Addresses-Coverity-ID: 1493860 ("Null pointer dereference")</Note>
    </Notes>
    <CVE>CVE-2022-48756</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48756.html</URL>
        <Description>CVE-2022-48756</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226698</URL>
        <Description>SUSE Bug 1226698</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="87">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put()

The bnx2fc_destroy() functions are removing the interface before calling
destroy_work. This results multiple WARNings from sysfs_remove_group() as
the controller rport device attributes are removed too early.

Replace the fcoe_port's destroy_work queue. It's not needed.

The problem is easily reproducible with the following steps.

Example:

  $ dmesg -w &amp;
  $ systemctl enable --now fcoe
  $ fipvlan -s -c ens2f1
  $ fcoeadm -d ens2f1.802
  [  583.464488] host2: libfc: Link down on port (7500a1)
  [  583.472651] bnx2fc: 7500a1 - rport not created Yet!!
  [  583.490468] ------------[ cut here ]------------
  [  583.538725] sysfs group 'power' not found for kobject 'rport-2:0-0'
  [  583.568814] WARNING: CPU: 3 PID: 192 at fs/sysfs/group.c:279 sysfs_remove_group+0x6f/0x80
  [  583.607130] Modules linked in: dm_service_time 8021q garp mrp stp llc bnx2fc cnic uio rpcsec_gss_krb5 auth_rpcgss nfsv4 ...
  [  583.942994] CPU: 3 PID: 192 Comm: kworker/3:2 Kdump: loaded Not tainted 5.14.0-39.el9.x86_64 #1
  [  583.984105] Hardware name: HP ProLiant DL120 G7, BIOS J01 07/01/2013
  [  584.016535] Workqueue: fc_wq_2 fc_rport_final_delete [scsi_transport_fc]
  [  584.050691] RIP: 0010:sysfs_remove_group+0x6f/0x80
  [  584.074725] Code: ff 5b 48 89 ef 5d 41 5c e9 ee c0 ff ff 48 89 ef e8 f6 b8 ff ff eb d1 49 8b 14 24 48 8b 33 48 c7 c7 ...
  [  584.162586] RSP: 0018:ffffb567c15afdc0 EFLAGS: 00010282
  [  584.188225] RAX: 0000000000000000 RBX: ffffffff8eec4220 RCX: 0000000000000000
  [  584.221053] RDX: ffff8c1586ce84c0 RSI: ffff8c1586cd7cc0 RDI: ffff8c1586cd7cc0
  [  584.255089] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffb567c15afc00
  [  584.287954] R10: ffffb567c15afbf8 R11: ffffffff8fbe7f28 R12: ffff8c1486326400
  [  584.322356] R13: ffff8c1486326480 R14: ffff8c1483a4a000 R15: 0000000000000004
  [  584.355379] FS:  0000000000000000(0000) GS:ffff8c1586cc0000(0000) knlGS:0000000000000000
  [  584.394419] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  [  584.421123] CR2: 00007fe95a6f7840 CR3: 0000000107674002 CR4: 00000000000606e0
  [  584.454888] Call Trace:
  [  584.466108]  device_del+0xb2/0x3e0
  [  584.481701]  device_unregister+0x13/0x60
  [  584.501306]  bsg_unregister_queue+0x5b/0x80
  [  584.522029]  bsg_remove_queue+0x1c/0x40
  [  584.541884]  fc_rport_final_delete+0xf3/0x1d0 [scsi_transport_fc]
  [  584.573823]  process_one_work+0x1e3/0x3b0
  [  584.592396]  worker_thread+0x50/0x3b0
  [  584.609256]  ? rescuer_thread+0x370/0x370
  [  584.628877]  kthread+0x149/0x170
  [  584.643673]  ? set_kthread_struct+0x40/0x40
  [  584.662909]  ret_from_fork+0x22/0x30
  [  584.680002] ---[ end trace 53575ecefa942ece ]---</Note>
    </Notes>
    <CVE>CVE-2022-48758</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48758.html</URL>
        <Description>CVE-2022-48758</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226708</URL>
        <Description>SUSE Bug 1226708</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="88">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev

struct rpmsg_ctrldev contains a struct cdev. The current code frees
the rpmsg_ctrldev struct in rpmsg_ctrldev_release_device(), but the
cdev is a managed object, therefore its release is not predictable
and the rpmsg_ctrldev could be freed before the cdev is entirely
released, as in the backtrace below.

[   93.625603] ODEBUG: free active (active state 0) object type: timer_list hint: delayed_work_timer_fn+0x0/0x7c
[   93.636115] WARNING: CPU: 0 PID: 12 at lib/debugobjects.c:488 debug_print_object+0x13c/0x1b0
[   93.644799] Modules linked in: veth xt_cgroup xt_MASQUERADE rfcomm algif_hash algif_skcipher af_alg uinput ip6table_nat fuse uvcvideo videobuf2_vmalloc venus_enc venus_dec videobuf2_dma_contig hci_uart btandroid btqca snd_soc_rt5682_i2c bluetooth qcom_spmi_temp_alarm snd_soc_rt5682v
[   93.715175] CPU: 0 PID: 12 Comm: kworker/0:1 Tainted: G    B             5.4.163-lockdep #26
[   93.723855] Hardware name: Google Lazor (rev3 - 8) with LTE (DT)
[   93.730055] Workqueue: events kobject_delayed_cleanup
[   93.735271] pstate: 60c00009 (nZCv daif +PAN +UAO)
[   93.740216] pc : debug_print_object+0x13c/0x1b0
[   93.744890] lr : debug_print_object+0x13c/0x1b0
[   93.749555] sp : ffffffacf5bc7940
[   93.752978] x29: ffffffacf5bc7940 x28: dfffffd000000000
[   93.758448] x27: ffffffacdb11a800 x26: dfffffd000000000
[   93.763916] x25: ffffffd0734f856c x24: dfffffd000000000
[   93.769389] x23: 0000000000000000 x22: ffffffd0733c35b0
[   93.774860] x21: ffffffd0751994a0 x20: ffffffd075ec27c0
[   93.780338] x19: ffffffd075199100 x18: 00000000000276e0
[   93.785814] x17: 0000000000000000 x16: dfffffd000000000
[   93.791291] x15: ffffffffffffffff x14: 6e6968207473696c
[   93.796768] x13: 0000000000000000 x12: ffffffd075e2b000
[   93.802244] x11: 0000000000000001 x10: 0000000000000000
[   93.807723] x9 : d13400dff1921900 x8 : d13400dff1921900
[   93.813200] x7 : 0000000000000000 x6 : 0000000000000000
[   93.818676] x5 : 0000000000000080 x4 : 0000000000000000
[   93.824152] x3 : ffffffd0732a0fa4 x2 : 0000000000000001
[   93.829628] x1 : ffffffacf5bc7580 x0 : 0000000000000061
[   93.835104] Call trace:
[   93.837644]  debug_print_object+0x13c/0x1b0
[   93.841963]  __debug_check_no_obj_freed+0x25c/0x3c0
[   93.846987]  debug_check_no_obj_freed+0x18/0x20
[   93.851669]  slab_free_freelist_hook+0xbc/0x1e4
[   93.856346]  kfree+0xfc/0x2f4
[   93.859416]  rpmsg_ctrldev_release_device+0x78/0xb8
[   93.864445]  device_release+0x84/0x168
[   93.868310]  kobject_cleanup+0x12c/0x298
[   93.872356]  kobject_delayed_cleanup+0x10/0x18
[   93.876948]  process_one_work+0x578/0x92c
[   93.881086]  worker_thread+0x804/0xcf8
[   93.884963]  kthread+0x2a8/0x314
[   93.888303]  ret_from_fork+0x10/0x18

The cdev_device_add/del() API was created to address this issue (see
commit '233ed09d7fda ("chardev: add helper function to register char
devs with a struct device")'), use it instead of cdev add/del().</Note>
    </Notes>
    <CVE>CVE-2022-48759</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48759.html</URL>
        <Description>CVE-2022-48759</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226711</URL>
        <Description>SUSE Bug 1226711</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="89">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

USB: core: Fix hang in usb_kill_urb by adding memory barriers

The syzbot fuzzer has identified a bug in which processes hang waiting
for usb_kill_urb() to return.  It turns out the issue is not unlinking
the URB; that works just fine.  Rather, the problem arises when the
wakeup notification that the URB has completed is not received.

The reason is memory-access ordering on SMP systems.  In outline form,
usb_kill_urb() and __usb_hcd_giveback_urb() operating concurrently on
different CPUs perform the following actions:

CPU 0					CPU 1
----------------------------		---------------------------------
usb_kill_urb():				__usb_hcd_giveback_urb():
  ...					  ...
  atomic_inc(&amp;urb-&gt;reject);		  atomic_dec(&amp;urb-&gt;use_count);
  ...					  ...
  wait_event(usb_kill_urb_queue,
	atomic_read(&amp;urb-&gt;use_count) == 0);
					  if (atomic_read(&amp;urb-&gt;reject))
						wake_up(&amp;usb_kill_urb_queue);

Confining your attention to urb-&gt;reject and urb-&gt;use_count, you can
see that the overall pattern of accesses on CPU 0 is:

	write urb-&gt;reject, then read urb-&gt;use_count;

whereas the overall pattern of accesses on CPU 1 is:

	write urb-&gt;use_count, then read urb-&gt;reject.

This pattern is referred to in memory-model circles as SB (for "Store
Buffering"), and it is well known that without suitable enforcement of
the desired order of accesses -- in the form of memory barriers -- it
is entirely possible for one or both CPUs to execute their reads ahead
of their writes.  The end result will be that sometimes CPU 0 sees the
old un-decremented value of urb-&gt;use_count while CPU 1 sees the old
un-incremented value of urb-&gt;reject.  Consequently CPU 0 ends up on
the wait queue and never gets woken up, leading to the observed hang
in usb_kill_urb().

The same pattern of accesses occurs in usb_poison_urb() and the
failure pathway of usb_hcd_submit_urb().

The problem is fixed by adding suitable memory barriers.  To provide
proper memory-access ordering in the SB pattern, a full barrier is
required on both CPUs.  The atomic_inc() and atomic_dec() accesses
themselves don't provide any memory ordering, but since they are
present, we can use the optimized smp_mb__after_atomic() memory
barrier in the various routines to obtain the desired effect.

This patch adds the necessary memory barriers.</Note>
    </Notes>
    <CVE>CVE-2022-48760</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48760.html</URL>
        <Description>CVE-2022-48760</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226712</URL>
        <Description>SUSE Bug 1226712</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="90">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

usb: xhci-plat: fix crash when suspend if remote wake enable

Crashed at i.mx8qm platform when suspend if enable remote wakeup

Internal error: synchronous external abort: 96000210 [#1] PREEMPT SMP
Modules linked in:
CPU: 2 PID: 244 Comm: kworker/u12:6 Not tainted 5.15.5-dirty #12
Hardware name: Freescale i.MX8QM MEK (DT)
Workqueue: events_unbound async_run_entry_fn
pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : xhci_disable_hub_port_wake.isra.62+0x60/0xf8
lr : xhci_disable_hub_port_wake.isra.62+0x34/0xf8
sp : ffff80001394bbf0
x29: ffff80001394bbf0 x28: 0000000000000000 x27: ffff00081193b578
x26: ffff00081193b570 x25: 0000000000000000 x24: 0000000000000000
x23: ffff00081193a29c x22: 0000000000020001 x21: 0000000000000001
x20: 0000000000000000 x19: ffff800014e90490 x18: 0000000000000000
x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
x14: 0000000000000000 x13: 0000000000000002 x12: 0000000000000000
x11: 0000000000000000 x10: 0000000000000960 x9 : ffff80001394baa0
x8 : ffff0008145d1780 x7 : ffff0008f95b8e80 x6 : 000000001853b453
x5 : 0000000000000496 x4 : 0000000000000000 x3 : ffff00081193a29c
x2 : 0000000000000001 x1 : 0000000000000000 x0 : ffff000814591620
Call trace:
 xhci_disable_hub_port_wake.isra.62+0x60/0xf8
 xhci_suspend+0x58/0x510
 xhci_plat_suspend+0x50/0x78
 platform_pm_suspend+0x2c/0x78
 dpm_run_callback.isra.25+0x50/0xe8
 __device_suspend+0x108/0x3c0

The basic flow:
	1. run time suspend call xhci_suspend, xhci parent devices gate the clock.
        2. echo mem &gt;/sys/power/state, system _device_suspend call xhci_suspend
        3. xhci_suspend call xhci_disable_hub_port_wake, which access register,
	   but clock already gated by run time suspend.

This problem was hidden by power domain driver, which call run time resume before it.

But the below commit remove it and make this issue happen.
	commit c1df456d0f06e ("PM: domains: Don't runtime resume devices at genpd_prepare()")

This patch call run time resume before suspend to make sure clock is on
before access register.

Testeb-by: Abel Vesa &lt;abel.vesa@nxp.com&gt;</Note>
    </Notes>
    <CVE>CVE-2022-48761</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48761.html</URL>
        <Description>CVE-2022-48761</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226701</URL>
        <Description>SUSE Bug 1226701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="91">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Forcibly leave nested virt when SMM state is toggled

Forcibly leave nested virtualization operation if userspace toggles SMM
state via KVM_SET_VCPU_EVENTS or KVM_SYNC_X86_EVENTS.  If userspace
forces the vCPU out of SMM while it's post-VMXON and then injects an SMI,
vmx_enter_smm() will overwrite vmx-&gt;nested.smm.vmxon and end up with both
vmxon=false and smm.vmxon=false, but all other nVMX state allocated.

Don't attempt to gracefully handle the transition as (a) most transitions
are nonsencial, e.g. forcing SMM while L2 is running, (b) there isn't
sufficient information to handle all transitions, e.g. SVM wants access
to the SMRAM save state, and (c) KVM_SET_VCPU_EVENTS must precede
KVM_SET_NESTED_STATE during state restore as the latter disallows putting
the vCPU into L2 if SMM is active, and disallows tagging the vCPU as
being post-VMXON in SMM if SMM is not active.

Abuse of KVM_SET_VCPU_EVENTS manifests as a WARN and memory leak in nVMX
due to failure to free vmcs01's shadow VMCS, but the bug goes far beyond
just a memory leak, e.g. toggling SMM on while L2 is active puts the vCPU
in an architecturally impossible state.

  WARNING: CPU: 0 PID: 3606 at free_loaded_vmcs arch/x86/kvm/vmx/vmx.c:2665 [inline]
  WARNING: CPU: 0 PID: 3606 at free_loaded_vmcs+0x158/0x1a0 arch/x86/kvm/vmx/vmx.c:2656
  Modules linked in:
  CPU: 1 PID: 3606 Comm: syz-executor725 Not tainted 5.17.0-rc1-syzkaller #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
  RIP: 0010:free_loaded_vmcs arch/x86/kvm/vmx/vmx.c:2665 [inline]
  RIP: 0010:free_loaded_vmcs+0x158/0x1a0 arch/x86/kvm/vmx/vmx.c:2656
  Code: &lt;0f&gt; 0b eb b3 e8 8f 4d 9f 00 e9 f7 fe ff ff 48 89 df e8 92 4d 9f 00
  Call Trace:
   &lt;TASK&gt;
   kvm_arch_vcpu_destroy+0x72/0x2f0 arch/x86/kvm/x86.c:11123
   kvm_vcpu_destroy arch/x86/kvm/../../../virt/kvm/kvm_main.c:441 [inline]
   kvm_destroy_vcpus+0x11f/0x290 arch/x86/kvm/../../../virt/kvm/kvm_main.c:460
   kvm_free_vcpus arch/x86/kvm/x86.c:11564 [inline]
   kvm_arch_destroy_vm+0x2e8/0x470 arch/x86/kvm/x86.c:11676
   kvm_destroy_vm arch/x86/kvm/../../../virt/kvm/kvm_main.c:1217 [inline]
   kvm_put_kvm+0x4fa/0xb00 arch/x86/kvm/../../../virt/kvm/kvm_main.c:1250
   kvm_vm_release+0x3f/0x50 arch/x86/kvm/../../../virt/kvm/kvm_main.c:1273
   __fput+0x286/0x9f0 fs/file_table.c:311
   task_work_run+0xdd/0x1a0 kernel/task_work.c:164
   exit_task_work include/linux/task_work.h:32 [inline]
   do_exit+0xb29/0x2a30 kernel/exit.c:806
   do_group_exit+0xd2/0x2f0 kernel/exit.c:935
   get_signal+0x4b0/0x28c0 kernel/signal.c:2862
   arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
   handle_signal_work kernel/entry/common.c:148 [inline]
   exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
   exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
   __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
   syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
   do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
   entry_SYSCALL_64_after_hwframe+0x44/0xae
   &lt;/TASK&gt;</Note>
    </Notes>
    <CVE>CVE-2022-48763</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48763.html</URL>
        <Description>CVE-2022-48763</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226628</URL>
        <Description>SUSE Bug 1226628</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="92">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

KVM: LAPIC: Also cancel preemption timer during SET_LAPIC

The below warning is splatting during guest reboot.

  ------------[ cut here ]------------
  WARNING: CPU: 0 PID: 1931 at arch/x86/kvm/x86.c:10322 kvm_arch_vcpu_ioctl_run+0x874/0x880 [kvm]
  CPU: 0 PID: 1931 Comm: qemu-system-x86 Tainted: G          I       5.17.0-rc1+ #5
  RIP: 0010:kvm_arch_vcpu_ioctl_run+0x874/0x880 [kvm]
  Call Trace:
   &lt;TASK&gt;
   kvm_vcpu_ioctl+0x279/0x710 [kvm]
   __x64_sys_ioctl+0x83/0xb0
   do_syscall_64+0x3b/0xc0
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  RIP: 0033:0x7fd39797350b

This can be triggered by not exposing tsc-deadline mode and doing a reboot in
the guest. The lapic_shutdown() function which is called in sys_reboot path
will not disarm the flying timer, it just masks LVTT. lapic_shutdown() clears
APIC state w/ LVT_MASKED and timer-mode bit is 0, this can trigger timer-mode
switch between tsc-deadline and oneshot/periodic, which can result in preemption
timer be cancelled in apic_update_lvtt(). However, We can't depend on this when
not exposing tsc-deadline mode and oneshot/periodic modes emulated by preemption
timer. Qemu will synchronise states around reset, let's cancel preemption timer
under KVM_SET_LAPIC.</Note>
    </Notes>
    <CVE>CVE-2022-48765</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48765.html</URL>
        <Description>CVE-2022-48765</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226697</URL>
        <Description>SUSE Bug 1226697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="93">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Wrap dcn301_calculate_wm_and_dlg for FPU.

Mirrors the logic for dcn30. Cue lots of WARNs and some
kernel panics without this fix.</Note>
    </Notes>
    <CVE>CVE-2022-48766</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48766.html</URL>
        <Description>CVE-2022-48766</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226704</URL>
        <Description>SUSE Bug 1226704</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="94">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ceph: properly put ceph_string reference after async create attempt

The reference acquired by try_prep_async_create is currently leaked.
Ensure we put it.</Note>
    </Notes>
    <CVE>CVE-2022-48767</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48767.html</URL>
        <Description>CVE-2022-48767</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226715</URL>
        <Description>SUSE Bug 1226715</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="95">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tracing/histogram: Fix a potential memory leak for kstrdup()

kfree() is missing on an error path to free the memory allocated by
kstrdup():

  p = param = kstrdup(data-&gt;params[i], GFP_KERNEL);

So it is better to free it via kfree(p).</Note>
    </Notes>
    <CVE>CVE-2022-48768</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48768.html</URL>
        <Description>CVE-2022-48768</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226720</URL>
        <Description>SUSE Bug 1226720</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="96">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

efi: runtime: avoid EFIv2 runtime services on Apple x86 machines

Aditya reports [0] that his recent MacbookPro crashes in the firmware
when using the variable services at runtime. The culprit appears to be a
call to QueryVariableInfo(), which we did not use to call on Apple x86
machines in the past as they only upgraded from EFI v1.10 to EFI v2.40
firmware fairly recently, and QueryVariableInfo() (along with
UpdateCapsule() et al) was added in EFI v2.00.

The only runtime service introduced in EFI v2.00 that we actually use in
Linux is QueryVariableInfo(), as the capsule based ones are optional,
generally not used at runtime (all the LVFS/fwupd firmware update
infrastructure uses helper EFI programs that invoke capsule update at
boot time, not runtime), and not implemented by Apple machines in the
first place. QueryVariableInfo() is used to 'safely' set variables,
i.e., only when there is enough space. This prevents machines with buggy
firmwares from corrupting their NVRAMs when they run out of space.

Given that Apple machines have been using EFI v1.10 services only for
the longest time (the EFI v2.0 spec was released in 2006, and Linux
support for the newly introduced runtime services was added in 2011, but
the MacbookPro12,1 released in 2015 still claims to be EFI v1.10 only),
let's avoid the EFI v2.0 ones on all Apple x86 machines.

[0] https://lore.kernel.org/all/6D757C75-65B1-468B-842D-10410081A8E4@live.com/</Note>
    </Notes>
    <CVE>CVE-2022-48769</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48769.html</URL>
        <Description>CVE-2022-48769</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226629</URL>
        <Description>SUSE Bug 1226629</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="97">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bpf: Guard against accessing NULL pt_regs in bpf_get_task_stack()

task_pt_regs() can return NULL on powerpc for kernel threads. This is
then used in __bpf_get_stack() to check for user mode, resulting in a
kernel oops. Guard against this by checking return value of
task_pt_regs() before trying to obtain the call chain.</Note>
    </Notes>
    <CVE>CVE-2022-48770</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48770.html</URL>
        <Description>CVE-2022-48770</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226730</URL>
        <Description>SUSE Bug 1226730</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="98">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Fix stale file descriptors on failed usercopy

A failing usercopy of the fence_rep object will lead to a stale entry in
the file descriptor table as put_unused_fd() won't release it. This
enables userland to refer to a dangling 'file' object through that still
valid file descriptor, leading to all kinds of use-after-free
exploitation scenarios.

Fix this by deferring the call to fd_install() until after the usercopy
has succeeded.</Note>
    </Notes>
    <CVE>CVE-2022-48771</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48771.html</URL>
        <Description>CVE-2022-48771</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226732</URL>
        <Description>SUSE Bug 1226732</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="99">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

media: lgdt3306a: Add a check against null-pointer-def

The driver should check whether the client provides the platform_data.

The following log reveals it:

[   29.610324] BUG: KASAN: null-ptr-deref in kmemdup+0x30/0x40
[   29.610730] Read of size 40 at addr 0000000000000000 by task bash/414
[   29.612820] Call Trace:
[   29.613030]  &lt;TASK&gt;
[   29.613201]  dump_stack_lvl+0x56/0x6f
[   29.613496]  ? kmemdup+0x30/0x40
[   29.613754]  print_report.cold+0x494/0x6b7
[   29.614082]  ? kmemdup+0x30/0x40
[   29.614340]  kasan_report+0x8a/0x190
[   29.614628]  ? kmemdup+0x30/0x40
[   29.614888]  kasan_check_range+0x14d/0x1d0
[   29.615213]  memcpy+0x20/0x60
[   29.615454]  kmemdup+0x30/0x40
[   29.615700]  lgdt3306a_probe+0x52/0x310
[   29.616339]  i2c_device_probe+0x951/0xa90</Note>
    </Notes>
    <CVE>CVE-2022-48772</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48772.html</URL>
        <Description>CVE-2022-48772</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226976</URL>
        <Description>SUSE Bug 1226976</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="100">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Bluetooth BR/EDR devices with Secure Simple Pairing and Secure Connections pairing in Bluetooth Core Specification 4.2 through 5.4 allow certain man-in-the-middle attacks that force a short key length, and might lead to discovery of the encryption key and live injection, aka BLUFFS.</Note>
    </Notes>
    <CVE>CVE-2023-24023</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-24023.html</URL>
        <Description>CVE-2023-24023</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218148</URL>
        <Description>SUSE Bug 1218148</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="101">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid online resizing failures due to oversized flex bg

When we online resize an ext4 filesystem with a oversized flexbg_size,

     mkfs.ext4 -F -G 67108864 $dev -b 4096 100M
     mount $dev $dir
     resize2fs $dev 16G

the following WARN_ON is triggered:
==================================================================
WARNING: CPU: 0 PID: 427 at mm/page_alloc.c:4402 __alloc_pages+0x411/0x550
Modules linked in: sg(E)
CPU: 0 PID: 427 Comm: resize2fs Tainted: G  E  6.6.0-rc5+ #314
RIP: 0010:__alloc_pages+0x411/0x550
Call Trace:
 &lt;TASK&gt;
 __kmalloc_large_node+0xa2/0x200
 __kmalloc+0x16e/0x290
 ext4_resize_fs+0x481/0xd80
 __ext4_ioctl+0x1616/0x1d90
 ext4_ioctl+0x12/0x20
 __x64_sys_ioctl+0xf0/0x150
 do_syscall_64+0x3b/0x90
==================================================================

This is because flexbg_size is too large and the size of the new_group_data
array to be allocated exceeds MAX_ORDER. Currently, the minimum value of
MAX_ORDER is 8, the minimum value of PAGE_SIZE is 4096, the corresponding
maximum number of groups that can be allocated is:

 (PAGE_SIZE &lt;&lt; MAX_ORDER) / sizeof(struct ext4_new_group_data) ~ 21845

And the value that is down-aligned to the power of 2 is 16384. Therefore,
this value is defined as MAX_RESIZE_BG, and the number of groups added
each time does not exceed this value during resizing, and is added multiple
times to complete the online resizing. The difference is that the metadata
in a flex_bg may be more dispersed.</Note>
    </Notes>
    <CVE>CVE-2023-52622</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52622.html</URL>
        <Description>CVE-2023-52622</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222080</URL>
        <Description>SUSE Bug 1222080</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="102">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Revert "net/mlx5: Block entering switchdev mode with ns inconsistency"

This reverts commit 662404b24a4c4d839839ed25e3097571f5938b9b.
The revert is required due to the suspicion it is not good for anything
and cause crash.</Note>
    </Notes>
    <CVE>CVE-2023-52658</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52658.html</URL>
        <Description>CVE-2023-52658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224719</URL>
        <Description>SUSE Bug 1224719</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="103">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: fix a potential double-free in fs_any_create_groups

When kcalloc() for ft-&gt;g succeeds but kvzalloc() for in fails,
fs_any_create_groups() will free ft-&gt;g. However, its caller
fs_any_create_table() will free ft-&gt;g again through calling
mlx5e_destroy_flow_table(), which will lead to a double-free.
Fix this by setting ft-&gt;g to NULL in fs_any_create_groups().</Note>
    </Notes>
    <CVE>CVE-2023-52667</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52667.html</URL>
        <Description>CVE-2023-52667</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224603</URL>
        <Description>SUSE Bug 1224603</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="104">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

rpmsg: virtio: Free driver_override when rpmsg_remove()

Free driver_override when rpmsg_remove(), otherwise
the following memory leak will occur:

unreferenced object 0xffff0000d55d7080 (size 128):
  comm "kworker/u8:2", pid 56, jiffies 4294893188 (age 214.272s)
  hex dump (first 32 bytes):
    72 70 6d 73 67 5f 6e 73 00 00 00 00 00 00 00 00  rpmsg_ns........
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;000000009c94c9c1&gt;] __kmem_cache_alloc_node+0x1f8/0x320
    [&lt;000000002300d89b&gt;] __kmalloc_node_track_caller+0x44/0x70
    [&lt;00000000228a60c3&gt;] kstrndup+0x4c/0x90
    [&lt;0000000077158695&gt;] driver_set_override+0xd0/0x164
    [&lt;000000003e9c4ea5&gt;] rpmsg_register_device_override+0x98/0x170
    [&lt;000000001c0c89a8&gt;] rpmsg_ns_register_device+0x24/0x30
    [&lt;000000008bbf8fa2&gt;] rpmsg_probe+0x2e0/0x3ec
    [&lt;00000000e65a68df&gt;] virtio_dev_probe+0x1c0/0x280
    [&lt;00000000443331cc&gt;] really_probe+0xbc/0x2dc
    [&lt;00000000391064b1&gt;] __driver_probe_device+0x78/0xe0
    [&lt;00000000a41c9a5b&gt;] driver_probe_device+0xd8/0x160
    [&lt;000000009c3bd5df&gt;] __device_attach_driver+0xb8/0x140
    [&lt;0000000043cd7614&gt;] bus_for_each_drv+0x7c/0xd4
    [&lt;000000003b929a36&gt;] __device_attach+0x9c/0x19c
    [&lt;00000000a94e0ba8&gt;] device_initial_probe+0x14/0x20
    [&lt;000000003c999637&gt;] bus_probe_device+0xa0/0xac</Note>
    </Notes>
    <CVE>CVE-2023-52670</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52670.html</URL>
        <Description>CVE-2023-52670</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224696</URL>
        <Description>SUSE Bug 1224696</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="105">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

pipe: wakeup wr_wait after setting max_usage

Commit c73be61cede5 ("pipe: Add general notification queue support") a
regression was introduced that would lock up resized pipes under certain
conditions. See the reproducer in [1].

The commit resizing the pipe ring size was moved to a different
function, doing that moved the wakeup for pipe-&gt;wr_wait before actually
raising pipe-&gt;max_usage. If a pipe was full before the resize occured it
would result in the wakeup never actually triggering pipe_write.

Set @max_usage and @nr_accounted before waking writers if this isn't a
watch queue.

[Christian Brauner &lt;brauner@kernel.org&gt;: rewrite to account for watch queues]</Note>
    </Notes>
    <CVE>CVE-2023-52672</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52672.html</URL>
        <Description>CVE-2023-52672</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224614</URL>
        <Description>SUSE Bug 1224614</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="106">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

powerpc/imc-pmu: Add a null pointer check in update_events_in_group()

kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure.</Note>
    </Notes>
    <CVE>CVE-2023-52675</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52675.html</URL>
        <Description>CVE-2023-52675</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224504</URL>
        <Description>SUSE Bug 1224504</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="107">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself

sock_map proto callbacks should never call themselves by design. Protect
against bugs like [1] and break out of the recursive loop to avoid a stack
overflow in favor of a resource leak.

[1] https://lore.kernel.org/all/00000000000073b14905ef2e7401@google.com/</Note>
    </Notes>
    <CVE>CVE-2023-52735</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52735.html</URL>
        <Description>CVE-2023-52735</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225475</URL>
        <Description>SUSE Bug 1225475</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="108">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

btrfs: lock the inode in shared mode before starting fiemap

Currently fiemap does not take the inode's lock (VFS lock), it only locks
a file range in the inode's io tree. This however can lead to a deadlock
if we have a concurrent fsync on the file and fiemap code triggers a fault
when accessing the user space buffer with fiemap_fill_next_extent(). The
deadlock happens on the inode's i_mmap_lock semaphore, which is taken both
by fsync and btrfs_page_mkwrite(). This deadlock was recently reported by
syzbot and triggers a trace like the following:

   task:syz-executor361 state:D stack:20264 pid:5668  ppid:5119   flags:0x00004004
   Call Trace:
    &lt;TASK&gt;
    context_switch kernel/sched/core.c:5293 [inline]
    __schedule+0x995/0xe20 kernel/sched/core.c:6606
    schedule+0xcb/0x190 kernel/sched/core.c:6682
    wait_on_state fs/btrfs/extent-io-tree.c:707 [inline]
    wait_extent_bit+0x577/0x6f0 fs/btrfs/extent-io-tree.c:751
    lock_extent+0x1c2/0x280 fs/btrfs/extent-io-tree.c:1742
    find_lock_delalloc_range+0x4e6/0x9c0 fs/btrfs/extent_io.c:488
    writepage_delalloc+0x1ef/0x540 fs/btrfs/extent_io.c:1863
    __extent_writepage+0x736/0x14e0 fs/btrfs/extent_io.c:2174
    extent_write_cache_pages+0x983/0x1220 fs/btrfs/extent_io.c:3091
    extent_writepages+0x219/0x540 fs/btrfs/extent_io.c:3211
    do_writepages+0x3c3/0x680 mm/page-writeback.c:2581
    filemap_fdatawrite_wbc+0x11e/0x170 mm/filemap.c:388
    __filemap_fdatawrite_range mm/filemap.c:421 [inline]
    filemap_fdatawrite_range+0x175/0x200 mm/filemap.c:439
    btrfs_fdatawrite_range fs/btrfs/file.c:3850 [inline]
    start_ordered_ops fs/btrfs/file.c:1737 [inline]
    btrfs_sync_file+0x4ff/0x1190 fs/btrfs/file.c:1839
    generic_write_sync include/linux/fs.h:2885 [inline]
    btrfs_do_write_iter+0xcd3/0x1280 fs/btrfs/file.c:1684
    call_write_iter include/linux/fs.h:2189 [inline]
    new_sync_write fs/read_write.c:491 [inline]
    vfs_write+0x7dc/0xc50 fs/read_write.c:584
    ksys_write+0x177/0x2a0 fs/read_write.c:637
    do_syscall_x64 arch/x86/entry/common.c:50 [inline]
    do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
    entry_SYSCALL_64_after_hwframe+0x63/0xcd
   RIP: 0033:0x7f7d4054e9b9
   RSP: 002b:00007f7d404fa2f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
   RAX: ffffffffffffffda RBX: 00007f7d405d87a0 RCX: 00007f7d4054e9b9
   RDX: 0000000000000090 RSI: 0000000020000000 RDI: 0000000000000006
   RBP: 00007f7d405a51d0 R08: 0000000000000000 R09: 0000000000000000
   R10: 0000000000000000 R11: 0000000000000246 R12: 61635f65646f6e69
   R13: 65646f7475616f6e R14: 7261637369646f6e R15: 00007f7d405d87a8
    &lt;/TASK&gt;
   INFO: task syz-executor361:5697 blocked for more than 145 seconds.
         Not tainted 6.2.0-rc3-syzkaller-00376-g7c6984405241 #0
   "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
   task:syz-executor361 state:D stack:21216 pid:5697  ppid:5119   flags:0x00004004
   Call Trace:
    &lt;TASK&gt;
    context_switch kernel/sched/core.c:5293 [inline]
    __schedule+0x995/0xe20 kernel/sched/core.c:6606
    schedule+0xcb/0x190 kernel/sched/core.c:6682
    rwsem_down_read_slowpath+0x5f9/0x930 kernel/locking/rwsem.c:1095
    __down_read_common+0x54/0x2a0 kernel/locking/rwsem.c:1260
    btrfs_page_mkwrite+0x417/0xc80 fs/btrfs/inode.c:8526
    do_page_mkwrite+0x19e/0x5e0 mm/memory.c:2947
    wp_page_shared+0x15e/0x380 mm/memory.c:3295
    handle_pte_fault mm/memory.c:4949 [inline]
    __handle_mm_fault mm/memory.c:5073 [inline]
    handle_mm_fault+0x1b79/0x26b0 mm/memory.c:5219
    do_user_addr_fault+0x69b/0xcb0 arch/x86/mm/fault.c:1428
    handle_page_fault arch/x86/mm/fault.c:1519 [inline]
    exc_page_fault+0x7a/0x110 arch/x86/mm/fault.c:1575
    asm_exc_page_fault+0x22/0x30 arch/x86/include/asm/idtentry.h:570
   RIP: 0010:copy_user_short_string+0xd/0x40 arch/x86/lib/copy_user_64.S:233
   Code: 74 0a 89 (...)
   RSP: 0018:ffffc9000570f330 EFLAGS: 000502
---truncated---</Note>
    </Notes>
    <CVE>CVE-2023-52737</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52737.html</URL>
        <Description>CVE-2023-52737</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225484</URL>
        <Description>SUSE Bug 1225484</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="109">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix use-after-free bug in cifs_debug_data_proc_show()

Skip SMB sessions that are being teared down
(e.g. @ses-&gt;ses_status == SES_EXITING) in cifs_debug_data_proc_show()
to avoid use-after-free in @ses.

This fixes the following GPF when reading from /proc/fs/cifs/DebugData
while mounting and umounting

  [ 816.251274] general protection fault, probably for non-canonical
  address 0x6b6b6b6b6b6b6d81: 0000 [#1] PREEMPT SMP NOPTI
  ...
  [  816.260138] Call Trace:
  [  816.260329]  &lt;TASK&gt;
  [  816.260499]  ? die_addr+0x36/0x90
  [  816.260762]  ? exc_general_protection+0x1b3/0x410
  [  816.261126]  ? asm_exc_general_protection+0x26/0x30
  [  816.261502]  ? cifs_debug_tcon+0xbd/0x240 [cifs]
  [  816.261878]  ? cifs_debug_tcon+0xab/0x240 [cifs]
  [  816.262249]  cifs_debug_data_proc_show+0x516/0xdb0 [cifs]
  [  816.262689]  ? seq_read_iter+0x379/0x470
  [  816.262995]  seq_read_iter+0x118/0x470
  [  816.263291]  proc_reg_read_iter+0x53/0x90
  [  816.263596]  ? srso_alias_return_thunk+0x5/0x7f
  [  816.263945]  vfs_read+0x201/0x350
  [  816.264211]  ksys_read+0x75/0x100
  [  816.264472]  do_syscall_64+0x3f/0x90
  [  816.264750]  entry_SYSCALL_64_after_hwframe+0x6e/0xd8
  [  816.265135] RIP: 0033:0x7fd5e669d381</Note>
    </Notes>
    <CVE>CVE-2023-52752</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52752.html</URL>
        <Description>CVE-2023-52752</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225487</URL>
        <Description>SUSE Bug 1225487</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225819</URL>
        <Description>SUSE Bug 1225819</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="110">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

i3c: mipi-i3c-hci: Fix out of bounds access in hci_dma_irq_handler

Do not loop over ring headers in hci_dma_irq_handler() that are not
allocated and enabled in hci_dma_init(). Otherwise out of bounds access
will occur from rings-&gt;headers[i] access when i &gt;= number of allocated
ring headers.</Note>
    </Notes>
    <CVE>CVE-2023-52766</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52766.html</URL>
        <Description>CVE-2023-52766</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230620</URL>
        <Description>SUSE Bug 1230620</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="111">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bonding: stop the device in bond_setup_by_slave()

Commit 9eed321cde22 ("net: lapbether: only support ethernet devices")
has been able to keep syzbot away from net/lapb, until today.

In the following splat [1], the issue is that a lapbether device has
been created on a bonding device without members. Then adding a non
ARPHRD_ETHER member forced the bonding master to change its type.

The fix is to make sure we call dev_close() in bond_setup_by_slave()
so that the potential linked lapbether devices (or any other devices
having assumptions on the physical device) are removed.

A similar bug has been addressed in commit 40baec225765
("bonding: fix panic on non-ARPHRD_ETHER enslave failure")

[1]
skbuff: skb_under_panic: text:ffff800089508810 len:44 put:40 head:ffff0000c78e7c00 data:ffff0000c78e7bea tail:0x16 end:0x140 dev:bond0
kernel BUG at net/core/skbuff.c:192 !
Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP
Modules linked in:
CPU: 0 PID: 6007 Comm: syz-executor383 Not tainted 6.6.0-rc3-syzkaller-gbf6547d8715b #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : skb_panic net/core/skbuff.c:188 [inline]
pc : skb_under_panic+0x13c/0x140 net/core/skbuff.c:202
lr : skb_panic net/core/skbuff.c:188 [inline]
lr : skb_under_panic+0x13c/0x140 net/core/skbuff.c:202
sp : ffff800096a06aa0
x29: ffff800096a06ab0 x28: ffff800096a06ba0 x27: dfff800000000000
x26: ffff0000ce9b9b50 x25: 0000000000000016 x24: ffff0000c78e7bea
x23: ffff0000c78e7c00 x22: 000000000000002c x21: 0000000000000140
x20: 0000000000000028 x19: ffff800089508810 x18: ffff800096a06100
x17: 0000000000000000 x16: ffff80008a629a3c x15: 0000000000000001
x14: 1fffe00036837a32 x13: 0000000000000000 x12: 0000000000000000
x11: 0000000000000201 x10: 0000000000000000 x9 : cb50b496c519aa00
x8 : cb50b496c519aa00 x7 : 0000000000000001 x6 : 0000000000000001
x5 : ffff800096a063b8 x4 : ffff80008e280f80 x3 : ffff8000805ad11c
x2 : 0000000000000001 x1 : 0000000100000201 x0 : 0000000000000086
Call trace:
skb_panic net/core/skbuff.c:188 [inline]
skb_under_panic+0x13c/0x140 net/core/skbuff.c:202
skb_push+0xf0/0x108 net/core/skbuff.c:2446
ip6gre_header+0xbc/0x738 net/ipv6/ip6_gre.c:1384
dev_hard_header include/linux/netdevice.h:3136 [inline]
lapbeth_data_transmit+0x1c4/0x298 drivers/net/wan/lapbether.c:257
lapb_data_transmit+0x8c/0xb0 net/lapb/lapb_iface.c:447
lapb_transmit_buffer+0x178/0x204 net/lapb/lapb_out.c:149
lapb_send_control+0x220/0x320 net/lapb/lapb_subr.c:251
__lapb_disconnect_request+0x9c/0x17c net/lapb/lapb_iface.c:326
lapb_device_event+0x288/0x4e0 net/lapb/lapb_iface.c:492
notifier_call_chain+0x1a4/0x510 kernel/notifier.c:93
raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:461
call_netdevice_notifiers_info net/core/dev.c:1970 [inline]
call_netdevice_notifiers_extack net/core/dev.c:2008 [inline]
call_netdevice_notifiers net/core/dev.c:2022 [inline]
__dev_close_many+0x1b8/0x3c4 net/core/dev.c:1508
dev_close_many+0x1e0/0x470 net/core/dev.c:1559
dev_close+0x174/0x250 net/core/dev.c:1585
lapbeth_device_event+0x2e4/0x958 drivers/net/wan/lapbether.c:466
notifier_call_chain+0x1a4/0x510 kernel/notifier.c:93
raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:461
call_netdevice_notifiers_info net/core/dev.c:1970 [inline]
call_netdevice_notifiers_extack net/core/dev.c:2008 [inline]
call_netdevice_notifiers net/core/dev.c:2022 [inline]
__dev_close_many+0x1b8/0x3c4 net/core/dev.c:1508
dev_close_many+0x1e0/0x470 net/core/dev.c:1559
dev_close+0x174/0x250 net/core/dev.c:1585
bond_enslave+0x2298/0x30cc drivers/net/bonding/bond_main.c:2332
bond_do_ioctl+0x268/0xc64 drivers/net/bonding/bond_main.c:4539
dev_ifsioc+0x754/0x9ac
dev_ioctl+0x4d8/0xd34 net/core/dev_ioctl.c:786
sock_do_ioctl+0x1d4/0x2d0 net/socket.c:1217
sock_ioctl+0x4e8/0x834 net/socket.c:1322
vfs_ioctl fs/ioctl.c:51 [inline]
__do_
---truncated---</Note>
    </Notes>
    <CVE>CVE-2023-52784</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52784.html</URL>
        <Description>CVE-2023-52784</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224946</URL>
        <Description>SUSE Bug 1224946</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="112">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

blk-mq: make sure active queue usage is held for bio_integrity_prep()

blk_integrity_unregister() can come if queue usage counter isn't held
for one bio with integrity prepared, so this request may be completed with
calling profile-&gt;complete_fn, then kernel panic.

Another constraint is that bio_integrity_prep() needs to be called
before bio merge.

Fix the issue by:

- call bio_integrity_prep() with one queue usage counter grabbed reliably

- call bio_integrity_prep() before bio merge</Note>
    </Notes>
    <CVE>CVE-2023-52787</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52787.html</URL>
        <Description>CVE-2023-52787</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225105</URL>
        <Description>SUSE Bug 1225105</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="113">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: fix htt pktlog locking

The ath11k active pdevs are protected by RCU but the htt pktlog handling
code calling ath11k_mac_get_ar_by_pdev_id() was not marked as a
read-side critical section.

Mark the code in question as an RCU read-side critical section to avoid
any potential use-after-free issues.

Compile tested only.</Note>
    </Notes>
    <CVE>CVE-2023-52800</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52800.html</URL>
        <Description>CVE-2023-52800</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230600</URL>
        <Description>SUSE Bug 1230600</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="114">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

perf/core: Bail out early if the request AUX area is out of bound

When perf-record with a large AUX area, e.g 4GB, it fails with:

    #perf record -C 0 -m ,4G -e arm_spe_0// -- sleep 1
    failed to mmap with 12 (Cannot allocate memory)

and it reveals a WARNING with __alloc_pages():

	------------[ cut here ]------------
	WARNING: CPU: 44 PID: 17573 at mm/page_alloc.c:5568 __alloc_pages+0x1ec/0x248
	Call trace:
	 __alloc_pages+0x1ec/0x248
	 __kmalloc_large_node+0xc0/0x1f8
	 __kmalloc_node+0x134/0x1e8
	 rb_alloc_aux+0xe0/0x298
	 perf_mmap+0x440/0x660
	 mmap_region+0x308/0x8a8
	 do_mmap+0x3c0/0x528
	 vm_mmap_pgoff+0xf4/0x1b8
	 ksys_mmap_pgoff+0x18c/0x218
	 __arm64_sys_mmap+0x38/0x58
	 invoke_syscall+0x50/0x128
	 el0_svc_common.constprop.0+0x58/0x188
	 do_el0_svc+0x34/0x50
	 el0_svc+0x34/0x108
	 el0t_64_sync_handler+0xb8/0xc0
	 el0t_64_sync+0x1a4/0x1a8

'rb-&gt;aux_pages' allocated by kcalloc() is a pointer array which is used to
maintains AUX trace pages. The allocated page for this array is physically
contiguous (and virtually contiguous) with an order of 0..MAX_ORDER. If the
size of pointer array crosses the limitation set by MAX_ORDER, it reveals a
WARNING.

So bail out early with -ENOMEM if the request AUX area is out of bound,
e.g.:

    #perf record -C 0 -m ,4G -e arm_spe_0// -- sleep 1
    failed to mmap with 12 (Cannot allocate memory)</Note>
    </Notes>
    <CVE>CVE-2023-52835</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52835.html</URL>
        <Description>CVE-2023-52835</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225602</URL>
        <Description>SUSE Bug 1225602</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="115">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nbd: fix uaf in nbd_open

Commit 4af5f2e03013 ("nbd: use blk_mq_alloc_disk and
blk_cleanup_disk") cleans up disk by blk_cleanup_disk() and it won't set
disk-&gt;private_data as NULL as before. UAF may be triggered in nbd_open()
if someone tries to open nbd device right after nbd_put() since nbd has
been free in nbd_dev_remove().

Fix this by implementing -&gt;free_disk and free private data in it.</Note>
    </Notes>
    <CVE>CVE-2023-52837</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52837.html</URL>
        <Description>CVE-2023-52837</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224935</URL>
        <Description>SUSE Bug 1224935</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="116">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

llc: verify mac len before reading mac header

LLC reads the mac header with eth_hdr without verifying that the skb
has an Ethernet header.

Syzbot was able to enter llc_rcv on a tun device. Tun can insert
packets without mac len and with user configurable skb-&gt;protocol
(passing a tun_pi header when not configuring IFF_NO_PI).

    BUG: KMSAN: uninit-value in llc_station_ac_send_test_r net/llc/llc_station.c:81 [inline]
    BUG: KMSAN: uninit-value in llc_station_rcv+0x6fb/0x1290 net/llc/llc_station.c:111
    llc_station_ac_send_test_r net/llc/llc_station.c:81 [inline]
    llc_station_rcv+0x6fb/0x1290 net/llc/llc_station.c:111
    llc_rcv+0xc5d/0x14a0 net/llc/llc_input.c:218
    __netif_receive_skb_one_core net/core/dev.c:5523 [inline]
    __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5637
    netif_receive_skb_internal net/core/dev.c:5723 [inline]
    netif_receive_skb+0x58/0x660 net/core/dev.c:5782
    tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1555
    tun_get_user+0x54c5/0x69c0 drivers/net/tun.c:2002

Add a mac_len test before all three eth_hdr(skb) calls under net/llc.

There are further uses in include/net/llc_pdu.h. All these are
protected by a test skb-&gt;protocol == ETH_P_802_2. Which does not
protect against this tun scenario.

But the mac_len test added in this patch in llc_fixup_skb will
indirectly protect those too. That is called from llc_rcv before any
other LLC code.

It is tempting to just add a blanket mac_len check in llc_rcv, but
not sure whether that could break valid LLC paths that do not assume
an Ethernet header. 802.2 LLC may be used on top of non-802.3
protocols in principle. The below referenced commit shows that used
to, on top of Token Ring.

At least one of the three eth_hdr uses goes back to before the start
of git history. But the one that syzbot exercises is introduced in
this commit. That commit is old enough (2008), that effectively all
stable kernels should receive this.</Note>
    </Notes>
    <CVE>CVE-2023-52843</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52843.html</URL>
        <Description>CVE-2023-52843</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224951</URL>
        <Description>SUSE Bug 1224951</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="117">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING

syzbot reported the following uninit-value access issue [1]:

=====================================================
BUG: KMSAN: uninit-value in strlen lib/string.c:418 [inline]
BUG: KMSAN: uninit-value in strstr+0xb8/0x2f0 lib/string.c:756
 strlen lib/string.c:418 [inline]
 strstr+0xb8/0x2f0 lib/string.c:756
 tipc_nl_node_reset_link_stats+0x3ea/0xb50 net/tipc/node.c:2595
 genl_family_rcv_msg_doit net/netlink/genetlink.c:971 [inline]
 genl_family_rcv_msg net/netlink/genetlink.c:1051 [inline]
 genl_rcv_msg+0x11ec/0x1290 net/netlink/genetlink.c:1066
 netlink_rcv_skb+0x371/0x650 net/netlink/af_netlink.c:2545
 genl_rcv+0x40/0x60 net/netlink/genetlink.c:1075
 netlink_unicast_kernel net/netlink/af_netlink.c:1342 [inline]
 netlink_unicast+0xf47/0x1250 net/netlink/af_netlink.c:1368
 netlink_sendmsg+0x1238/0x13d0 net/netlink/af_netlink.c:1910
 sock_sendmsg_nosec net/socket.c:730 [inline]
 sock_sendmsg net/socket.c:753 [inline]
 ____sys_sendmsg+0x9c2/0xd60 net/socket.c:2541
 ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2595
 __sys_sendmsg net/socket.c:2624 [inline]
 __do_sys_sendmsg net/socket.c:2633 [inline]
 __se_sys_sendmsg net/socket.c:2631 [inline]
 __x64_sys_sendmsg+0x307/0x490 net/socket.c:2631
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

Uninit was created at:
 slab_post_alloc_hook+0x12f/0xb70 mm/slab.h:767
 slab_alloc_node mm/slub.c:3478 [inline]
 kmem_cache_alloc_node+0x577/0xa80 mm/slub.c:3523
 kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:559
 __alloc_skb+0x318/0x740 net/core/skbuff.c:650
 alloc_skb include/linux/skbuff.h:1286 [inline]
 netlink_alloc_large_skb net/netlink/af_netlink.c:1214 [inline]
 netlink_sendmsg+0xb34/0x13d0 net/netlink/af_netlink.c:1885
 sock_sendmsg_nosec net/socket.c:730 [inline]
 sock_sendmsg net/socket.c:753 [inline]
 ____sys_sendmsg+0x9c2/0xd60 net/socket.c:2541
 ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2595
 __sys_sendmsg net/socket.c:2624 [inline]
 __do_sys_sendmsg net/socket.c:2633 [inline]
 __se_sys_sendmsg net/socket.c:2631 [inline]
 __x64_sys_sendmsg+0x307/0x490 net/socket.c:2631
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

TIPC bearer-related names including link names must be null-terminated
strings. If a link name which is not null-terminated is passed through
netlink, strstr() and similar functions can cause buffer overrun. This
causes the above issue.

This patch changes the nla_policy for bearer-related names from NLA_STRING
to NLA_NUL_STRING. This resolves the issue by ensuring that only
null-terminated strings are accepted as bearer-related names.

syzbot reported similar uninit-value issue related to bearer names [2]. The
root cause of this issue is that a non-null-terminated bearer name was
passed. This patch also resolved this issue.</Note>
    </Notes>
    <CVE>CVE-2023-52845</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52845.html</URL>
        <Description>CVE-2023-52845</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225585</URL>
        <Description>SUSE Bug 1225585</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="118">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

hsr: Prevent use after free in prp_create_tagged_frame()

The prp_fill_rct() function can fail.  In that situation, it frees the
skb and returns NULL.  Meanwhile on the success path, it returns the
original skb.  So it's straight forward to fix bug by using the returned
value.</Note>
    </Notes>
    <CVE>CVE-2023-52846</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52846.html</URL>
        <Description>CVE-2023-52846</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225098</URL>
        <Description>SUSE Bug 1225098</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225099</URL>
        <Description>SUSE Bug 1225099</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="119">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

pstore/platform: Add check for kstrdup

Add check for the return value of kstrdup() and return the error
if it fails in order to avoid NULL pointer dereference.</Note>
    </Notes>
    <CVE>CVE-2023-52869</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52869.html</URL>
        <Description>CVE-2023-52869</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225050</URL>
        <Description>SUSE Bug 1225050</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="120">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tcp: do not accept ACK of bytes we never sent

This patch is based on a detailed report and ideas from Yepeng Pan
and Christian Rossow.

ACK seq validation is currently following RFC 5961 5.2 guidelines:

   The ACK value is considered acceptable only if
   it is in the range of ((SND.UNA - MAX.SND.WND) &lt;= SEG.ACK &lt;=
   SND.NXT).  All incoming segments whose ACK value doesn't satisfy the
   above condition MUST be discarded and an ACK sent back.  It needs to
   be noted that RFC 793 on page 72 (fifth check) says: "If the ACK is a
   duplicate (SEG.ACK &lt; SND.UNA), it can be ignored.  If the ACK
   acknowledges something not yet sent (SEG.ACK &gt; SND.NXT) then send an
   ACK, drop the segment, and return".  The "ignored" above implies that
   the processing of the incoming data segment continues, which means
   the ACK value is treated as acceptable.  This mitigation makes the
   ACK check more stringent since any ACK &lt; SND.UNA wouldn't be
   accepted, instead only ACKs that are in the range ((SND.UNA -
   MAX.SND.WND) &lt;= SEG.ACK &lt;= SND.NXT) get through.

This can be refined for new (and possibly spoofed) flows,
by not accepting ACK for bytes that were never sent.

This greatly improves TCP security at a little cost.

I added a Fixes: tag to make sure this patch will reach stable trees,
even if the 'blamed' patch was adhering to the RFC.

tp-&gt;bytes_acked was added in linux-4.2

Following packetdrill test (courtesy of Yepeng Pan) shows
the issue at hand:

0 socket(..., SOCK_STREAM, IPPROTO_TCP) = 3
+0 setsockopt(3, SOL_SOCKET, SO_REUSEADDR, [1], 4) = 0
+0 bind(3, ..., ...) = 0
+0 listen(3, 1024) = 0

// ---------------- Handshake ------------------- //

// when window scale is set to 14 the window size can be extended to
// 65535 * (2^14) = 1073725440. Linux would accept an ACK packet
// with ack number in (Server_ISN+1-1073725440. Server_ISN+1)
// ,though this ack number acknowledges some data never
// sent by the server.

+0 &lt; S 0:0(0) win 65535 &lt;mss 1400,nop,wscale 14&gt;
+0 &gt; S. 0:0(0) ack 1 &lt;...&gt;
+0 &lt; . 1:1(0) ack 1 win 65535
+0 accept(3, ..., ...) = 4

// For the established connection, we send an ACK packet,
// the ack packet uses ack number 1 - 1073725300 + 2^32,
// where 2^32 is used to wrap around.
// Note: we used 1073725300 instead of 1073725440 to avoid possible
// edge cases.
// 1 - 1073725300 + 2^32 = 3221241997

// Oops, old kernels happily accept this packet.
+0 &lt; . 1:1001(1000) ack 3221241997 win 65535

// After the kernel fix the following will be replaced by a challenge ACK,
// and prior malicious frame would be dropped.
+0 &gt; . 1:1(0) ack 1001</Note>
    </Notes>
    <CVE>CVE-2023-52881</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52881.html</URL>
        <Description>CVE-2023-52881</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223384</URL>
        <Description>SUSE Bug 1223384</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225611</URL>
        <Description>SUSE Bug 1225611</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226152</URL>
        <Description>SUSE Bug 1226152</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="121">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change

While PLL CPUX clock rate change when CPU is running from it works in
vast majority of cases, now and then it causes instability. This leads
to system crashes and other undefined behaviour. After a lot of testing
(30+ hours) while also doing a lot of frequency switches, we can't
observe any instability issues anymore when doing reparenting to stable
clock like 24 MHz oscillator.</Note>
    </Notes>
    <CVE>CVE-2023-52882</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52882.html</URL>
        <Description>CVE-2023-52882</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225692</URL>
        <Description>SUSE Bug 1225692</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="122">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Input: cyapa - add missing input core locking to suspend/resume functions

Grab input-&gt;mutex during suspend/resume functions like it is done in
other input drivers. This fixes the following warning during system
suspend/resume cycle on Samsung Exynos5250-based Snow Chromebook:

------------[ cut here ]------------
WARNING: CPU: 1 PID: 1680 at drivers/input/input.c:2291 input_device_enabled+0x68/0x6c
Modules linked in: ...
CPU: 1 PID: 1680 Comm: kworker/u4:12 Tainted: G        W          6.6.0-rc5-next-20231009 #14109
Hardware name: Samsung Exynos (Flattened Device Tree)
Workqueue: events_unbound async_run_entry_fn
 unwind_backtrace from show_stack+0x10/0x14
 show_stack from dump_stack_lvl+0x58/0x70
 dump_stack_lvl from __warn+0x1a8/0x1cc
 __warn from warn_slowpath_fmt+0x18c/0x1b4
 warn_slowpath_fmt from input_device_enabled+0x68/0x6c
 input_device_enabled from cyapa_gen3_set_power_mode+0x13c/0x1dc
 cyapa_gen3_set_power_mode from cyapa_reinitialize+0x10c/0x15c
 cyapa_reinitialize from cyapa_resume+0x48/0x98
 cyapa_resume from dpm_run_callback+0x90/0x298
 dpm_run_callback from device_resume+0xb4/0x258
 device_resume from async_resume+0x20/0x64
 async_resume from async_run_entry_fn+0x40/0x15c
 async_run_entry_fn from process_scheduled_works+0xbc/0x6a8
 process_scheduled_works from worker_thread+0x188/0x454
 worker_thread from kthread+0x108/0x140
 kthread from ret_from_fork+0x14/0x28
Exception stack(0xf1625fb0 to 0xf1625ff8)
...
---[ end trace 0000000000000000 ]---
...
------------[ cut here ]------------
WARNING: CPU: 1 PID: 1680 at drivers/input/input.c:2291 input_device_enabled+0x68/0x6c
Modules linked in: ...
CPU: 1 PID: 1680 Comm: kworker/u4:12 Tainted: G        W          6.6.0-rc5-next-20231009 #14109
Hardware name: Samsung Exynos (Flattened Device Tree)
Workqueue: events_unbound async_run_entry_fn
 unwind_backtrace from show_stack+0x10/0x14
 show_stack from dump_stack_lvl+0x58/0x70
 dump_stack_lvl from __warn+0x1a8/0x1cc
 __warn from warn_slowpath_fmt+0x18c/0x1b4
 warn_slowpath_fmt from input_device_enabled+0x68/0x6c
 input_device_enabled from cyapa_gen3_set_power_mode+0x13c/0x1dc
 cyapa_gen3_set_power_mode from cyapa_reinitialize+0x10c/0x15c
 cyapa_reinitialize from cyapa_resume+0x48/0x98
 cyapa_resume from dpm_run_callback+0x90/0x298
 dpm_run_callback from device_resume+0xb4/0x258
 device_resume from async_resume+0x20/0x64
 async_resume from async_run_entry_fn+0x40/0x15c
 async_run_entry_fn from process_scheduled_works+0xbc/0x6a8
 process_scheduled_works from worker_thread+0x188/0x454
 worker_thread from kthread+0x108/0x140
 kthread from ret_from_fork+0x14/0x28
Exception stack(0xf1625fb0 to 0xf1625ff8)
...
---[ end trace 0000000000000000 ]---</Note>
    </Notes>
    <CVE>CVE-2023-52884</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52884.html</URL>
        <Description>CVE-2023-52884</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226764</URL>
        <Description>SUSE Bug 1226764</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="123">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

llc: call sock_orphan() at release time

syzbot reported an interesting trace [1] caused by a stale sk-&gt;sk_wq
pointer in a closed llc socket.

In commit ff7b11aa481f ("net: socket: set sock-&gt;sk to NULL after
calling proto_ops::release()") Eric Biggers hinted that some protocols
are missing a sock_orphan(), we need to perform a full audit.

In net-next, I plan to clear sock-&gt;sk from sock_orphan() and
amend Eric patch to add a warning.

[1]
 BUG: KASAN: slab-use-after-free in list_empty include/linux/list.h:373 [inline]
 BUG: KASAN: slab-use-after-free in waitqueue_active include/linux/wait.h:127 [inline]
 BUG: KASAN: slab-use-after-free in sock_def_write_space_wfree net/core/sock.c:3384 [inline]
 BUG: KASAN: slab-use-after-free in sock_wfree+0x9a8/0x9d0 net/core/sock.c:2468
Read of size 8 at addr ffff88802f4fc880 by task ksoftirqd/1/27

CPU: 1 PID: 27 Comm: ksoftirqd/1 Not tainted 6.8.0-rc1-syzkaller-00049-g6098d87eaf31 #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
Call Trace:
 &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:88 [inline]
  dump_stack_lvl+0xd9/0x1b0 lib/dump_stack.c:106
  print_address_description mm/kasan/report.c:377 [inline]
  print_report+0xc4/0x620 mm/kasan/report.c:488
  kasan_report+0xda/0x110 mm/kasan/report.c:601
  list_empty include/linux/list.h:373 [inline]
  waitqueue_active include/linux/wait.h:127 [inline]
  sock_def_write_space_wfree net/core/sock.c:3384 [inline]
  sock_wfree+0x9a8/0x9d0 net/core/sock.c:2468
  skb_release_head_state+0xa3/0x2b0 net/core/skbuff.c:1080
  skb_release_all net/core/skbuff.c:1092 [inline]
  napi_consume_skb+0x119/0x2b0 net/core/skbuff.c:1404
  e1000_unmap_and_free_tx_resource+0x144/0x200 drivers/net/ethernet/intel/e1000/e1000_main.c:1970
  e1000_clean_tx_irq drivers/net/ethernet/intel/e1000/e1000_main.c:3860 [inline]
  e1000_clean+0x4a1/0x26e0 drivers/net/ethernet/intel/e1000/e1000_main.c:3801
  __napi_poll.constprop.0+0xb4/0x540 net/core/dev.c:6576
  napi_poll net/core/dev.c:6645 [inline]
  net_rx_action+0x956/0xe90 net/core/dev.c:6778
  __do_softirq+0x21a/0x8de kernel/softirq.c:553
  run_ksoftirqd kernel/softirq.c:921 [inline]
  run_ksoftirqd+0x31/0x60 kernel/softirq.c:913
  smpboot_thread_fn+0x660/0xa10 kernel/smpboot.c:164
  kthread+0x2c6/0x3a0 kernel/kthread.c:388
  ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
  ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242
 &lt;/TASK&gt;

Allocated by task 5167:
  kasan_save_stack+0x33/0x50 mm/kasan/common.c:47
  kasan_save_track+0x14/0x30 mm/kasan/common.c:68
  unpoison_slab_object mm/kasan/common.c:314 [inline]
  __kasan_slab_alloc+0x81/0x90 mm/kasan/common.c:340
  kasan_slab_alloc include/linux/kasan.h:201 [inline]
  slab_post_alloc_hook mm/slub.c:3813 [inline]
  slab_alloc_node mm/slub.c:3860 [inline]
  kmem_cache_alloc_lru+0x142/0x6f0 mm/slub.c:3879
  alloc_inode_sb include/linux/fs.h:3019 [inline]
  sock_alloc_inode+0x25/0x1c0 net/socket.c:308
  alloc_inode+0x5d/0x220 fs/inode.c:260
  new_inode_pseudo+0x16/0x80 fs/inode.c:1005
  sock_alloc+0x40/0x270 net/socket.c:634
  __sock_create+0xbc/0x800 net/socket.c:1535
  sock_create net/socket.c:1622 [inline]
  __sys_socket_create net/socket.c:1659 [inline]
  __sys_socket+0x14c/0x260 net/socket.c:1706
  __do_sys_socket net/socket.c:1720 [inline]
  __se_sys_socket net/socket.c:1718 [inline]
  __x64_sys_socket+0x72/0xb0 net/socket.c:1718
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xd3/0x250 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

Freed by task 0:
  kasan_save_stack+0x33/0x50 mm/kasan/common.c:47
  kasan_save_track+0x14/0x30 mm/kasan/common.c:68
  kasan_save_free_info+0x3f/0x60 mm/kasan/generic.c:640
  poison_slab_object mm/kasan/common.c:241 [inline]
  __kasan_slab_free+0x121/0x1b0 mm/kasan/common.c:257
  kasan_slab_free include/linux/kasan.h:184 [inline]
  slab_free_hook mm/slub.c:2121 [inlin
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-26625</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26625.html</URL>
        <Description>CVE-2024-26625</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221086</URL>
        <Description>SUSE Bug 1221086</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="124">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

btrfs: don't abort filesystem when attempting to snapshot deleted subvolume

If the source file descriptor to the snapshot ioctl refers to a deleted
subvolume, we get the following abort:

  BTRFS: Transaction aborted (error -2)
  WARNING: CPU: 0 PID: 833 at fs/btrfs/transaction.c:1875 create_pending_snapshot+0x1040/0x1190 [btrfs]
  Modules linked in: pata_acpi btrfs ata_piix libata scsi_mod virtio_net blake2b_generic xor net_failover virtio_rng failover scsi_common rng_core raid6_pq libcrc32c
  CPU: 0 PID: 833 Comm: t_snapshot_dele Not tainted 6.7.0-rc6 #2
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-1.fc39 04/01/2014
  RIP: 0010:create_pending_snapshot+0x1040/0x1190 [btrfs]
  RSP: 0018:ffffa09c01337af8 EFLAGS: 00010282
  RAX: 0000000000000000 RBX: ffff9982053e7c78 RCX: 0000000000000027
  RDX: ffff99827dc20848 RSI: 0000000000000001 RDI: ffff99827dc20840
  RBP: ffffa09c01337c00 R08: 0000000000000000 R09: ffffa09c01337998
  R10: 0000000000000003 R11: ffffffffb96da248 R12: fffffffffffffffe
  R13: ffff99820535bb28 R14: ffff99820b7bd000 R15: ffff99820381ea80
  FS:  00007fe20aadabc0(0000) GS:ffff99827dc00000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000559a120b502f CR3: 00000000055b6000 CR4: 00000000000006f0
  Call Trace:
   &lt;TASK&gt;
   ? create_pending_snapshot+0x1040/0x1190 [btrfs]
   ? __warn+0x81/0x130
   ? create_pending_snapshot+0x1040/0x1190 [btrfs]
   ? report_bug+0x171/0x1a0
   ? handle_bug+0x3a/0x70
   ? exc_invalid_op+0x17/0x70
   ? asm_exc_invalid_op+0x1a/0x20
   ? create_pending_snapshot+0x1040/0x1190 [btrfs]
   ? create_pending_snapshot+0x1040/0x1190 [btrfs]
   create_pending_snapshots+0x92/0xc0 [btrfs]
   btrfs_commit_transaction+0x66b/0xf40 [btrfs]
   btrfs_mksubvol+0x301/0x4d0 [btrfs]
   btrfs_mksnapshot+0x80/0xb0 [btrfs]
   __btrfs_ioctl_snap_create+0x1c2/0x1d0 [btrfs]
   btrfs_ioctl_snap_create_v2+0xc4/0x150 [btrfs]
   btrfs_ioctl+0x8a6/0x2650 [btrfs]
   ? kmem_cache_free+0x22/0x340
   ? do_sys_openat2+0x97/0xe0
   __x64_sys_ioctl+0x97/0xd0
   do_syscall_64+0x46/0xf0
   entry_SYSCALL_64_after_hwframe+0x6e/0x76
  RIP: 0033:0x7fe20abe83af
  RSP: 002b:00007ffe6eff1360 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
  RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007fe20abe83af
  RDX: 00007ffe6eff23c0 RSI: 0000000050009417 RDI: 0000000000000003
  RBP: 0000000000000003 R08: 0000000000000000 R09: 00007fe20ad16cd0
  R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
  R13: 00007ffe6eff13c0 R14: 00007fe20ad45000 R15: 0000559a120b6d58
   &lt;/TASK&gt;
  ---[ end trace 0000000000000000 ]---
  BTRFS: error (device vdc: state A) in create_pending_snapshot:1875: errno=-2 No such entry
  BTRFS info (device vdc: state EA): forced readonly
  BTRFS warning (device vdc: state EA): Skipping commit of aborted transaction.
  BTRFS: error (device vdc: state EA) in cleanup_transaction:2055: errno=-2 No such entry

This happens because create_pending_snapshot() initializes the new root
item as a copy of the source root item. This includes the refs field,
which is 0 for a deleted subvolume. The call to btrfs_insert_root()
therefore inserts a root with refs == 0. btrfs_get_new_fs_root() then
finds the root and returns -ENOENT if refs == 0, which causes
create_pending_snapshot() to abort.

Fix it by checking the source root's refs before attempting the
snapshot, but after locking subvol_sem to avoid racing with deletion.</Note>
    </Notes>
    <CVE>CVE-2024-26644</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26644.html</URL>
        <Description>CVE-2024-26644</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222072</URL>
        <Description>SUSE Bug 1222072</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="125">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.</Note>
    </Notes>
    <CVE>CVE-2024-26720</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26720.html</URL>
        <Description>CVE-2024-26720</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222364</URL>
        <Description>SUSE Bug 1222364</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="126">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: core: Fix shift issue in ufshcd_clear_cmd()

When task_tag &gt;= 32 (in MCQ mode) and sizeof(unsigned int) == 4, 1U &lt;&lt;
task_tag will out of bounds for a u32 mask. Fix this up to prevent
SHIFT_ISSUE (bitwise shifts that are out of bounds for their data type).

[name:debug_monitors&amp;]Unexpected kernel BRK exception at EL1
[name:traps&amp;]Internal error: BRK handler: 00000000f2005514 [#1] PREEMPT SMP
[name:mediatek_cpufreq_hw&amp;]cpufreq stop DVFS log done
[name:mrdump&amp;]Kernel Offset: 0x1ba5800000 from 0xffffffc008000000
[name:mrdump&amp;]PHYS_OFFSET: 0x80000000
[name:mrdump&amp;]pstate: 22400005 (nzCv daif +PAN -UAO)
[name:mrdump&amp;]pc : [0xffffffdbaf52bb2c] ufshcd_clear_cmd+0x280/0x288
[name:mrdump&amp;]lr : [0xffffffdbaf52a774] ufshcd_wait_for_dev_cmd+0x3e4/0x82c
[name:mrdump&amp;]sp : ffffffc0081471b0
&lt;snip&gt;
Workqueue: ufs_eh_wq_0 ufshcd_err_handler
Call trace:
 dump_backtrace+0xf8/0x144
 show_stack+0x18/0x24
 dump_stack_lvl+0x78/0x9c
 dump_stack+0x18/0x44
 mrdump_common_die+0x254/0x480 [mrdump]
 ipanic_die+0x20/0x30 [mrdump]
 notify_die+0x15c/0x204
 die+0x10c/0x5f8
 arm64_notify_die+0x74/0x13c
 do_debug_exception+0x164/0x26c
 el1_dbg+0x64/0x80
 el1h_64_sync_handler+0x3c/0x90
 el1h_64_sync+0x68/0x6c
 ufshcd_clear_cmd+0x280/0x288
 ufshcd_wait_for_dev_cmd+0x3e4/0x82c
 ufshcd_exec_dev_cmd+0x5bc/0x9ac
 ufshcd_verify_dev_init+0x84/0x1c8
 ufshcd_probe_hba+0x724/0x1ce0
 ufshcd_host_reset_and_restore+0x260/0x574
 ufshcd_reset_and_restore+0x138/0xbd0
 ufshcd_err_handler+0x1218/0x2f28
 process_one_work+0x5fc/0x1140
 worker_thread+0x7d8/0xe20
 kthread+0x25c/0x468
 ret_from_fork+0x10/0x20</Note>
    </Notes>
    <CVE>CVE-2024-26842</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26842.html</URL>
        <Description>CVE-2024-26842</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223013</URL>
        <Description>SUSE Bug 1223013</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="127">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: target: core: Add TMF to tmr_list handling

An abort that is responded to by iSCSI itself is added to tmr_list but does
not go to target core. A LUN_RESET that goes through tmr_list takes a
refcounter on the abort and waits for completion. However, the abort will
be never complete because it was not started in target core.

 Unable to locate ITT: 0x05000000 on CID: 0
 Unable to locate RefTaskTag: 0x05000000 on CID: 0.
 wait_for_tasks: Stopping tmf LUN_RESET with tag 0x0 ref_task_tag 0x0 i_state 34 t_state ISTATE_PROCESSING refcnt 2 transport_state active,stop,fabric_stop
 wait for tasks: tmf LUN_RESET with tag 0x0 ref_task_tag 0x0 i_state 34 t_state ISTATE_PROCESSING refcnt 2 transport_state active,stop,fabric_stop
...
 INFO: task kworker/0:2:49 blocked for more than 491 seconds.
 task:kworker/0:2     state:D stack:    0 pid:   49 ppid:     2 flags:0x00000800
 Workqueue: events target_tmr_work [target_core_mod]
Call Trace:
 __switch_to+0x2c4/0x470
 _schedule+0x314/0x1730
 schedule+0x64/0x130
 schedule_timeout+0x168/0x430
 wait_for_completion+0x140/0x270
 target_put_cmd_and_wait+0x64/0xb0 [target_core_mod]
 core_tmr_lun_reset+0x30/0xa0 [target_core_mod]
 target_tmr_work+0xc8/0x1b0 [target_core_mod]
 process_one_work+0x2d4/0x5d0
 worker_thread+0x78/0x6c0

To fix this, only add abort to tmr_list if it will be handled by target
core.</Note>
    </Notes>
    <CVE>CVE-2024-26845</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26845.html</URL>
        <Description>CVE-2024-26845</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223018</URL>
        <Description>SUSE Bug 1223018</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="128">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

af_unix: Fix garbage collector racing against connect()

Garbage collector does not take into account the risk of embryo getting
enqueued during the garbage collection. If such embryo has a peer that
carries SCM_RIGHTS, two consecutive passes of scan_children() may see a
different set of children. Leading to an incorrectly elevated inflight
count, and then a dangling pointer within the gc_inflight_list.

sockets are AF_UNIX/SOCK_STREAM
S is an unconnected socket
L is a listening in-flight socket bound to addr, not in fdtable
V's fd will be passed via sendmsg(), gets inflight count bumped

connect(S, addr)	sendmsg(S, [V]); close(V)	__unix_gc()
----------------	-------------------------	-----------

NS = unix_create1()
skb1 = sock_wmalloc(NS)
L = unix_find_other(addr)
unix_state_lock(L)
unix_peer(S) = NS
			// V count=1 inflight=0

 			NS = unix_peer(S)
 			skb2 = sock_alloc()
			skb_queue_tail(NS, skb2[V])

			// V became in-flight
			// V count=2 inflight=1

			close(V)

			// V count=1 inflight=1
			// GC candidate condition met

						for u in gc_inflight_list:
						  if (total_refs == inflight_refs)
						    add u to gc_candidates

						// gc_candidates={L, V}

						for u in gc_candidates:
						  scan_children(u, dec_inflight)

						// embryo (skb1) was not
						// reachable from L yet, so V's
						// inflight remains unchanged
__skb_queue_tail(L, skb1)
unix_state_unlock(L)
						for u in gc_candidates:
						  if (u.inflight)
						    scan_children(u, inc_inflight_move_tail)

						// V count=1 inflight=2 (!)

If there is a GC-candidate listening socket, lock/unlock its state. This
makes GC wait until the end of any ongoing connect() to that socket. After
flipping the lock, a possibly SCM-laden embryo is already enqueued. And if
there is another embryo coming, it can not possibly carry SCM_RIGHTS. At
this point, unix_inflight() can not happen because unix_gc_lock is already
taken. Inflight graph remains unaffected.</Note>
    </Notes>
    <CVE>CVE-2024-26923</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26923.html</URL>
        <Description>CVE-2024-26923</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223384</URL>
        <Description>SUSE Bug 1223384</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223683</URL>
        <Description>SUSE Bug 1223683</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="129">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

fat: fix uninitialized field in nostale filehandles

When fat_encode_fh_nostale() encodes file handle without a parent it
stores only first 10 bytes of the file handle. However the length of the
file handle must be a multiple of 4 so the file handle is actually 12
bytes long and the last two bytes remain uninitialized. This is not
great at we potentially leak uninitialized information with the handle
to userspace. Properly initialize the full handle length.</Note>
    </Notes>
    <CVE>CVE-2024-26973</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26973.html</URL>
        <Description>CVE-2024-26973</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223641</URL>
        <Description>SUSE Bug 1223641</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="130">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: ethernet: mtk_eth_soc: fix PPE hanging issue

A patch to resolve an issue was found in MediaTek's GPL-licensed SDK:
In the mtk_ppe_stop() function, the PPE scan mode is not disabled before
disabling the PPE. This can potentially lead to a hang during the process
of disabling the PPE.

Without this patch, the PPE may experience a hang during the reboot test.</Note>
    </Notes>
    <CVE>CVE-2024-27432</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-27432.html</URL>
        <Description>CVE-2024-27432</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224716</URL>
        <Description>SUSE Bug 1224716</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="131">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

efi: libstub: only free priv.runtime_map when allocated

priv.runtime_map is only allocated when efi_novamap is not set.
Otherwise, it is an uninitialized value.  In the error path, it is freed
unconditionally.  Avoid passing an uninitialized value to free_pool.
Free priv.runtime_map only when it was allocated.

This bug was discovered and resolved using Coverity Static Analysis
Security Testing (SAST) by Synopsys, Inc.</Note>
    </Notes>
    <CVE>CVE-2024-33619</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-33619.html</URL>
        <Description>CVE-2024-33619</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226768</URL>
        <Description>SUSE Bug 1226768</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="132">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

fpga: region: add owner module and take its refcount

The current implementation of the fpga region assumes that the low-level
module registers a driver for the parent device and uses its owner pointer
to take the module's refcount. This approach is problematic since it can
lead to a null pointer dereference while attempting to get the region
during programming if the parent device does not have a driver.

To address this problem, add a module owner pointer to the fpga_region
struct and use it to take the module's refcount. Modify the functions for
registering a region to take an additional owner module parameter and
rename them to avoid conflicts. Use the old function names for helper
macros that automatically set the module that registers the region as the
owner. This ensures compatibility with existing low-level control modules
and reduces the chances of registering a region without setting the owner.

Also, update the documentation to keep it consistent with the new interface
for registering an fpga region.</Note>
    </Notes>
    <CVE>CVE-2024-35247</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35247.html</URL>
        <Description>CVE-2024-35247</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226948</URL>
        <Description>SUSE Bug 1226948</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="133">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes

When moving a station out of a VLAN and deleting the VLAN afterwards, the
fast_rx entry still holds a pointer to the VLAN's netdev, which can cause
use-after-free bugs. Fix this by immediately calling ieee80211_check_fast_rx
after the VLAN change.</Note>
    </Notes>
    <CVE>CVE-2024-35789</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35789.html</URL>
        <Description>CVE-2024-35789</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224749</URL>
        <Description>SUSE Bug 1224749</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227320</URL>
        <Description>SUSE Bug 1227320</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="134">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

usb: typec: altmodes/displayport: create sysfs nodes as driver's default device attribute group

The DisplayPort driver's sysfs nodes may be present to the userspace before
typec_altmode_set_drvdata() completes in dp_altmode_probe. This means that
a sysfs read can trigger a NULL pointer error by deferencing dp-&gt;hpd in
hpd_show or dp-&gt;lock in pin_assignment_show, as dev_get_drvdata() returns
NULL in those cases.

Remove manual sysfs node creation in favor of adding attribute group as
default for devices bound to the driver. The ATTRIBUTE_GROUPS() macro is
not used here otherwise the path to the sysfs nodes is no longer compliant
with the ABI.</Note>
    </Notes>
    <CVE>CVE-2024-35790</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35790.html</URL>
        <Description>CVE-2024-35790</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224712</URL>
        <Description>SUSE Bug 1224712</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="135">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ext4: fix corruption during on-line resize

We observed a corruption during on-line resize of a file system that is
larger than 16 TiB with 4k block size. With having more then 2^32 blocks
resize_inode is turned off by default by mke2fs. The issue can be
reproduced on a smaller file system for convenience by explicitly
turning off resize_inode. An on-line resize across an 8 GiB boundary (the
size of a meta block group in this setup) then leads to a corruption:

  dev=/dev/&lt;some_dev&gt; # should be &gt;= 16 GiB
  mkdir -p /corruption
  /sbin/mke2fs -t ext4 -b 4096 -O ^resize_inode $dev $((2 * 2**21 - 2**15))
  mount -t ext4 $dev /corruption

  dd if=/dev/zero bs=4096 of=/corruption/test count=$((2*2**21 - 4*2**15))
  sha1sum /corruption/test
  # 79d2658b39dcfd77274e435b0934028adafaab11  /corruption/test

  /sbin/resize2fs $dev $((2*2**21))
  # drop page cache to force reload the block from disk
  echo 1 &gt; /proc/sys/vm/drop_caches

  sha1sum /corruption/test
  # 3c2abc63cbf1a94c9e6977e0fbd72cd832c4d5c3  /corruption/test

2^21 = 2^15*2^6 equals 8 GiB whereof 2^15 is the number of blocks per
block group and 2^6 are the number of block groups that make a meta
block group.

The last checksum might be different depending on how the file is laid
out across the physical blocks. The actual corruption occurs at physical
block 63*2^15 = 2064384 which would be the location of the backup of the
meta block group's block descriptor. During the on-line resize the file
system will be converted to meta_bg starting at s_first_meta_bg which is
2 in the example - meaning all block groups after 16 GiB. However, in
ext4_flex_group_add we might add block groups that are not part of the
first meta block group yet. In the reproducer we achieved this by
substracting the size of a whole block group from the point where the
meta block group would start. This must be considered when updating the
backup block group descriptors to follow the non-meta_bg layout. The fix
is to add a test whether the group to add is already part of the meta
block group or not.</Note>
    </Notes>
    <CVE>CVE-2024-35807</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35807.html</URL>
        <Description>CVE-2024-35807</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224735</URL>
        <Description>SUSE Bug 1224735</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="136">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

swiotlb: Fix double-allocation of slots due to broken alignment handling

Commit bbb73a103fbb ("swiotlb: fix a braino in the alignment check fix"),
which was a fix for commit 0eee5ae10256 ("swiotlb: fix slot alignment
checks"), causes a functional regression with vsock in a virtual machine
using bouncing via a restricted DMA SWIOTLB pool.

When virtio allocates the virtqueues for the vsock device using
dma_alloc_coherent(), the SWIOTLB search can return page-unaligned
allocations if 'area-&gt;index' was left unaligned by a previous allocation
from the buffer:

 # Final address in brackets is the SWIOTLB address returned to the caller
 | virtio-pci 0000:00:07.0: orig_addr 0x0 alloc_size 0x2000, iotlb_align_mask 0x800 stride 0x2: got slot 1645-1649/7168 (0x98326800)
 | virtio-pci 0000:00:07.0: orig_addr 0x0 alloc_size 0x2000, iotlb_align_mask 0x800 stride 0x2: got slot 1649-1653/7168 (0x98328800)
 | virtio-pci 0000:00:07.0: orig_addr 0x0 alloc_size 0x2000, iotlb_align_mask 0x800 stride 0x2: got slot 1653-1657/7168 (0x9832a800)

This ends badly (typically buffer corruption and/or a hang) because
swiotlb_alloc() is expecting a page-aligned allocation and so blindly
returns a pointer to the 'struct page' corresponding to the allocation,
therefore double-allocating the first half (2KiB slot) of the 4KiB page.

Fix the problem by treating the allocation alignment separately to any
additional alignment requirements from the device, using the maximum
of the two as the stride to search the buffer slots and taking care
to ensure a minimum of page-alignment for buffers larger than a page.

This also resolves swiotlb allocation failures occuring due to the
inclusion of ~PAGE_MASK in 'iotlb_align_mask' for large allocations and
resulting in alignment requirements exceeding swiotlb_max_mapping_size().</Note>
    </Notes>
    <CVE>CVE-2024-35814</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35814.html</URL>
        <Description>CVE-2024-35814</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224602</URL>
        <Description>SUSE Bug 1224602</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="137">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: fix a double-free in arfs_create_groups

When `in` allocated by kvzalloc fails, arfs_create_groups will free
ft-&gt;g and return an error. However, arfs_create_table, the only caller of
arfs_create_groups, will hold this error and call to
mlx5e_destroy_flow_table, in which the ft-&gt;g will be freed again.</Note>
    </Notes>
    <CVE>CVE-2024-35835</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35835.html</URL>
        <Description>CVE-2024-35835</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224605</URL>
        <Description>SUSE Bug 1224605</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="138">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

eeprom: at24: fix memory corruption race condition

If the eeprom is not accessible, an nvmem device will be registered, the
read will fail, and the device will be torn down. If another driver
accesses the nvmem device after the teardown, it will reference
invalid memory.

Move the failure point before registering the nvmem device.</Note>
    </Notes>
    <CVE>CVE-2024-35848</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35848.html</URL>
        <Description>CVE-2024-35848</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224612</URL>
        <Description>SUSE Bug 1224612</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="139">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

icmp: prevent possible NULL dereferences from icmp_build_probe()

First problem is a double call to __in_dev_get_rcu(), because
the second one could return NULL.

if (__in_dev_get_rcu(dev) &amp;&amp; __in_dev_get_rcu(dev)-&gt;ifa_list)

Second problem is a read from dev-&gt;ip6_ptr with no NULL check:

if (!list_empty(&amp;rcu_dereference(dev-&gt;ip6_ptr)-&gt;addr_list))

Use the correct RCU API to fix these.

v2: add missing include &lt;net/addrconf.h&gt;</Note>
    </Notes>
    <CVE>CVE-2024-35857</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35857.html</URL>
        <Description>CVE-2024-35857</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224619</URL>
        <Description>SUSE Bug 1224619</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="140">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect()

Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF.</Note>
    </Notes>
    <CVE>CVE-2024-35861</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35861.html</URL>
        <Description>CVE-2024-35861</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224766</URL>
        <Description>SUSE Bug 1224766</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225312</URL>
        <Description>SUSE Bug 1225312</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="141">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential UAF in smb2_is_network_name_deleted()

Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF.</Note>
    </Notes>
    <CVE>CVE-2024-35862</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35862.html</URL>
        <Description>CVE-2024-35862</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224764</URL>
        <Description>SUSE Bug 1224764</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225311</URL>
        <Description>SUSE Bug 1225311</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="142">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential UAF in smb2_is_valid_lease_break()

Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF.</Note>
    </Notes>
    <CVE>CVE-2024-35864</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35864.html</URL>
        <Description>CVE-2024-35864</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224765</URL>
        <Description>SUSE Bug 1224765</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225309</URL>
        <Description>SUSE Bug 1225309</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="143">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

smb: client: guarantee refcounted children from parent session

Avoid potential use-after-free bugs when walking DFS referrals,
mounting and performing DFS failover by ensuring that all children
from parent @tcon-&gt;ses are also refcounted.  They're all needed across
the entire DFS mount.  Get rid of @tcon-&gt;dfs_ses_list while we're at
it, too.</Note>
    </Notes>
    <CVE>CVE-2024-35869</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35869.html</URL>
        <Description>CVE-2024-35869</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224679</URL>
        <Description>SUSE Bug 1224679</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226328</URL>
        <Description>SUSE Bug 1226328</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="144">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

of: module: prevent NULL pointer dereference in vsnprintf()

In of_modalias(), we can get passed the str and len parameters which would
cause a kernel oops in vsnprintf() since it only allows passing a NULL ptr
when the length is also 0. Also, we need to filter out the negative values
of the len parameter as these will result in a really huge buffer since
snprintf() takes size_t parameter while ours is ssize_t...

Found by Linux Verification Center (linuxtesting.org) with the Svace static
analysis tool.</Note>
    </Notes>
    <CVE>CVE-2024-35878</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35878.html</URL>
        <Description>CVE-2024-35878</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224671</URL>
        <Description>SUSE Bug 1224671</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="145">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

udp: do not accept non-tunnel GSO skbs landing in a tunnel

When rx-udp-gro-forwarding is enabled UDP packets might be GROed when
being forwarded. If such packets might land in a tunnel this can cause
various issues and udp_gro_receive makes sure this isn't the case by
looking for a matching socket. This is performed in
udp4/6_gro_lookup_skb but only in the current netns. This is an issue
with tunneled packets when the endpoint is in another netns. In such
cases the packets will be GROed at the UDP level, which leads to various
issues later on. The same thing can happen with rx-gro-list.

We saw this with geneve packets being GROed at the UDP level. In such
case gso_size is set; later the packet goes through the geneve rx path,
the geneve header is pulled, the offset are adjusted and frag_list skbs
are not adjusted with regard to geneve. When those skbs hit
skb_fragment, it will misbehave. Different outcomes are possible
depending on what the GROed skbs look like; from corrupted packets to
kernel crashes.

One example is a BUG_ON[1] triggered in skb_segment while processing the
frag_list. Because gso_size is wrong (geneve header was pulled)
skb_segment thinks there is "geneve header size" of data in frag_list,
although it's in fact the next packet. The BUG_ON itself has nothing to
do with the issue. This is only one of the potential issues.

Looking up for a matching socket in udp_gro_receive is fragile: the
lookup could be extended to all netns (not speaking about performances)
but nothing prevents those packets from being modified in between and we
could still not find a matching socket. It's OK to keep the current
logic there as it should cover most cases but we also need to make sure
we handle tunnel packets being GROed too early.

This is done by extending the checks in udp_unexpected_gso: GSO packets
lacking the SKB_GSO_UDP_TUNNEL/_CSUM bits and landing in a tunnel must
be segmented.

[1] kernel BUG at net/core/skbuff.c:4408!
    RIP: 0010:skb_segment+0xd2a/0xf70
    __udp_gso_segment+0xaa/0x560</Note>
    </Notes>
    <CVE>CVE-2024-35884</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35884.html</URL>
        <Description>CVE-2024-35884</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224520</URL>
        <Description>SUSE Bug 1224520</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="146">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ipv6: Fix infinite recursion in fib6_dump_done().

syzkaller reported infinite recursive calls of fib6_dump_done() during
netlink socket destruction.  [1]

From the log, syzkaller sent an AF_UNSPEC RTM_GETROUTE message, and then
the response was generated.  The following recvmmsg() resumed the dump
for IPv6, but the first call of inet6_dump_fib() failed at kzalloc() due
to the fault injection.  [0]

  12:01:34 executing program 3:
  r0 = socket$nl_route(0x10, 0x3, 0x0)
  sendmsg$nl_route(r0, ... snip ...)
  recvmmsg(r0, ... snip ...) (fail_nth: 8)

Here, fib6_dump_done() was set to nlk_sk(sk)-&gt;cb.done, and the next call
of inet6_dump_fib() set it to nlk_sk(sk)-&gt;cb.args[3].  syzkaller stopped
receiving the response halfway through, and finally netlink_sock_destruct()
called nlk_sk(sk)-&gt;cb.done().

fib6_dump_done() calls fib6_dump_end() and nlk_sk(sk)-&gt;cb.done() if it
is still not NULL.  fib6_dump_end() rewrites nlk_sk(sk)-&gt;cb.done() by
nlk_sk(sk)-&gt;cb.args[3], but it has the same function, not NULL, calling
itself recursively and hitting the stack guard page.

To avoid the issue, let's set the destructor after kzalloc().

[0]:
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 1 PID: 432110 Comm: syz-executor.3 Not tainted 6.8.0-12821-g537c2e91d354-dirty #11
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl (lib/dump_stack.c:117)
 should_fail_ex (lib/fault-inject.c:52 lib/fault-inject.c:153)
 should_failslab (mm/slub.c:3733)
 kmalloc_trace (mm/slub.c:3748 mm/slub.c:3827 mm/slub.c:3992)
 inet6_dump_fib (./include/linux/slab.h:628 ./include/linux/slab.h:749 net/ipv6/ip6_fib.c:662)
 rtnl_dump_all (net/core/rtnetlink.c:4029)
 netlink_dump (net/netlink/af_netlink.c:2269)
 netlink_recvmsg (net/netlink/af_netlink.c:1988)
 ____sys_recvmsg (net/socket.c:1046 net/socket.c:2801)
 ___sys_recvmsg (net/socket.c:2846)
 do_recvmmsg (net/socket.c:2943)
 __x64_sys_recvmmsg (net/socket.c:3041 net/socket.c:3034 net/socket.c:3034)

[1]:
BUG: TASK stack guard page was hit at 00000000f2fa9af1 (stack is 00000000b7912430..000000009a436beb)
stack guard page: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 223719 Comm: kworker/1:3 Not tainted 6.8.0-12821-g537c2e91d354-dirty #11
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
Workqueue: events netlink_sock_destruct_work
RIP: 0010:fib6_dump_done (net/ipv6/ip6_fib.c:570)
Code: 3c 24 e8 f3 e9 51 fd e9 28 fd ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 41 57 41 56 41 55 41 54 55 48 89 fd &lt;53&gt; 48 8d 5d 60 e8 b6 4d 07 fd 48 89 da 48 b8 00 00 00 00 00 fc ff
RSP: 0018:ffffc9000d980000 EFLAGS: 00010293
RAX: 0000000000000000 RBX: ffffffff84405990 RCX: ffffffff844059d3
RDX: ffff8881028e0000 RSI: ffffffff84405ac2 RDI: ffff88810c02f358
RBP: ffff88810c02f358 R08: 0000000000000007 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000224 R12: 0000000000000000
R13: ffff888007c82c78 R14: ffff888007c82c68 R15: ffff888007c82c68
FS:  0000000000000000(0000) GS:ffff88811b100000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffc9000d97fff8 CR3: 0000000102309002 CR4: 0000000000770ef0
PKRU: 55555554
Call Trace:
 &lt;#DF&gt;
 &lt;/#DF&gt;
 &lt;TASK&gt;
 fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))
 fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))
 ...
 fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))
 fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))
 netlink_sock_destruct (net/netlink/af_netlink.c:401)
 __sk_destruct (net/core/sock.c:2177 (discriminator 2))
 sk_destruct (net/core/sock.c:2224)
 __sk_free (net/core/sock.c:2235)
 sk_free (net/core/sock.c:2246)
 process_one_work (kernel/workqueue.c:3259)
 worker_thread (kernel/workqueue.c:3329 kernel/workqueue.
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-35886</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35886.html</URL>
        <Description>CVE-2024-35886</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224670</URL>
        <Description>SUSE Bug 1224670</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="147">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: validate user input for expected length

I got multiple syzbot reports showing old bugs exposed
by BPF after commit 20f2505fb436 ("bpf: Try to avoid kzalloc
in cgroup/{s,g}etsockopt")

setsockopt() @optlen argument should be taken into account
before copying data.

 BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]
 BUG: KASAN: slab-out-of-bounds in copy_from_sockptr include/linux/sockptr.h:55 [inline]
 BUG: KASAN: slab-out-of-bounds in do_replace net/ipv4/netfilter/ip_tables.c:1111 [inline]
 BUG: KASAN: slab-out-of-bounds in do_ipt_set_ctl+0x902/0x3dd0 net/ipv4/netfilter/ip_tables.c:1627
Read of size 96 at addr ffff88802cd73da0 by task syz-executor.4/7238

CPU: 1 PID: 7238 Comm: syz-executor.4 Not tainted 6.9.0-rc2-next-20240403-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Call Trace:
 &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:88 [inline]
  dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
  print_address_description mm/kasan/report.c:377 [inline]
  print_report+0x169/0x550 mm/kasan/report.c:488
  kasan_report+0x143/0x180 mm/kasan/report.c:601
  kasan_check_range+0x282/0x290 mm/kasan/generic.c:189
  __asan_memcpy+0x29/0x70 mm/kasan/shadow.c:105
  copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]
  copy_from_sockptr include/linux/sockptr.h:55 [inline]
  do_replace net/ipv4/netfilter/ip_tables.c:1111 [inline]
  do_ipt_set_ctl+0x902/0x3dd0 net/ipv4/netfilter/ip_tables.c:1627
  nf_setsockopt+0x295/0x2c0 net/netfilter/nf_sockopt.c:101
  do_sock_setsockopt+0x3af/0x720 net/socket.c:2311
  __sys_setsockopt+0x1ae/0x250 net/socket.c:2334
  __do_sys_setsockopt net/socket.c:2343 [inline]
  __se_sys_setsockopt net/socket.c:2340 [inline]
  __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340
 do_syscall_64+0xfb/0x240
 entry_SYSCALL_64_after_hwframe+0x72/0x7a
RIP: 0033:0x7fd22067dde9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fd21f9ff0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: ffffffffffffffda RBX: 00007fd2207abf80 RCX: 00007fd22067dde9
RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003
RBP: 00007fd2206ca47a R08: 0000000000000001 R09: 0000000000000000
R10: 0000000020000880 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000000b R14: 00007fd2207abf80 R15: 00007ffd2d0170d8
 &lt;/TASK&gt;

Allocated by task 7238:
  kasan_save_stack mm/kasan/common.c:47 [inline]
  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
  poison_kmalloc_redzone mm/kasan/common.c:370 [inline]
  __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:387
  kasan_kmalloc include/linux/kasan.h:211 [inline]
  __do_kmalloc_node mm/slub.c:4069 [inline]
  __kmalloc_noprof+0x200/0x410 mm/slub.c:4082
  kmalloc_noprof include/linux/slab.h:664 [inline]
  __cgroup_bpf_run_filter_setsockopt+0xd47/0x1050 kernel/bpf/cgroup.c:1869
  do_sock_setsockopt+0x6b4/0x720 net/socket.c:2293
  __sys_setsockopt+0x1ae/0x250 net/socket.c:2334
  __do_sys_setsockopt net/socket.c:2343 [inline]
  __se_sys_setsockopt net/socket.c:2340 [inline]
  __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340
 do_syscall_64+0xfb/0x240
 entry_SYSCALL_64_after_hwframe+0x72/0x7a

The buggy address belongs to the object at ffff88802cd73da0
 which belongs to the cache kmalloc-8 of size 8
The buggy address is located 0 bytes inside of
 allocated 1-byte region [ffff88802cd73da0, ffff88802cd73da1)

The buggy address belongs to the physical page:
page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88802cd73020 pfn:0x2cd73
flags: 0xfff80000000000(node=0|zone=1|lastcpupid=0xfff)
page_type: 0xffffefff(slab)
raw: 00fff80000000000 ffff888015041280 dead000000000100 dead000000000122
raw: ffff88802cd73020 000000008080007f 00000001ffffefff 00
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-35896</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35896.html</URL>
        <Description>CVE-2024-35896</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224662</URL>
        <Description>SUSE Bug 1224662</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="148">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()

nft_unregister_flowtable_type() within nf_flow_inet_module_exit() can
concurrent with __nft_flowtable_type_get() within nf_tables_newflowtable().
And thhere is not any protection when iterate over nf_tables_flowtables
list in __nft_flowtable_type_get(). Therefore, there is pertential
data-race of nf_tables_flowtables list entry.

Use list_for_each_entry_rcu() to iterate over nf_tables_flowtables list
in __nft_flowtable_type_get(), and use rcu_read_lock() in the caller
nft_flowtable_type_get() to protect the entire type query process.</Note>
    </Notes>
    <CVE>CVE-2024-35898</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35898.html</URL>
        <Description>CVE-2024-35898</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224498</URL>
        <Description>SUSE Bug 1224498</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="149">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: reject new basechain after table flag update

When dormant flag is toggled, hooks are disabled in the commit phase by
iterating over current chains in table (existing and new).

The following configuration allows for an inconsistent state:

  add table x
  add chain x y { type filter hook input priority 0; }
  add table x { flags dormant; }
  add chain x w { type filter hook input priority 1; }

which triggers the following warning when trying to unregister chain w
which is already unregistered.

[  127.322252] WARNING: CPU: 7 PID: 1211 at net/netfilter/core.c:50                                                                     1 __nf_unregister_net_hook+0x21a/0x260
[...]
[  127.322519] Call Trace:
[  127.322521]  &lt;TASK&gt;
[  127.322524]  ? __warn+0x9f/0x1a0
[  127.322531]  ? __nf_unregister_net_hook+0x21a/0x260
[  127.322537]  ? report_bug+0x1b1/0x1e0
[  127.322545]  ? handle_bug+0x3c/0x70
[  127.322552]  ? exc_invalid_op+0x17/0x40
[  127.322556]  ? asm_exc_invalid_op+0x1a/0x20
[  127.322563]  ? kasan_save_free_info+0x3b/0x60
[  127.322570]  ? __nf_unregister_net_hook+0x6a/0x260
[  127.322577]  ? __nf_unregister_net_hook+0x21a/0x260
[  127.322583]  ? __nf_unregister_net_hook+0x6a/0x260
[  127.322590]  ? __nf_tables_unregister_hook+0x8a/0xe0 [nf_tables]
[  127.322655]  nft_table_disable+0x75/0xf0 [nf_tables]
[  127.322717]  nf_tables_commit+0x2571/0x2620 [nf_tables]</Note>
    </Notes>
    <CVE>CVE-2024-35900</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35900.html</URL>
        <Description>CVE-2024-35900</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224497</URL>
        <Description>SUSE Bug 1224497</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="150">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bpf: Protect against int overflow for stack access size

This patch re-introduces protection against the size of access to stack
memory being negative; the access size can appear negative as a result
of overflowing its signed int representation. This should not actually
happen, as there are other protections along the way, but we should
protect against it anyway. One code path was missing such protections
(fixed in the previous patch in the series), causing out-of-bounds array
accesses in check_stack_range_initialized(). This patch causes the
verification of a program with such a non-sensical access size to fail.

This check used to exist in a more indirect way, but was inadvertendly
removed in a833a17aeac7.</Note>
    </Notes>
    <CVE>CVE-2024-35905</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35905.html</URL>
        <Description>CVE-2024-35905</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224488</URL>
        <Description>SUSE Bug 1224488</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226327</URL>
        <Description>SUSE Bug 1226327</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="151">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

block: prevent division by zero in blk_rq_stat_sum()

The expression dst-&gt;nr_samples + src-&gt;nr_samples may
have zero value on overflow. It is necessary to add
a check to avoid division by zero.

Found by Linux Verification Center (linuxtesting.org) with Svace.</Note>
    </Notes>
    <CVE>CVE-2024-35925</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35925.html</URL>
        <Description>CVE-2024-35925</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224661</URL>
        <Description>SUSE Bug 1224661</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="152">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/client: Fully protect modes[] with dev-&gt;mode_config.mutex

The modes[] array contains pointers to modes on the connectors'
mode lists, which are protected by dev-&gt;mode_config.mutex.
Thus we need to extend modes[] the same protection or by the
time we use it the elements may already be pointing to
freed/reused memory.</Note>
    </Notes>
    <CVE>CVE-2024-35950</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35950.html</URL>
        <Description>CVE-2024-35950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224703</URL>
        <Description>SUSE Bug 1224703</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225310</URL>
        <Description>SUSE Bug 1225310</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="153">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

btrfs: qgroup: fix qgroup prealloc rsv leak in subvolume operations

Create subvolume, create snapshot and delete subvolume all use
btrfs_subvolume_reserve_metadata() to reserve metadata for the changes
done to the parent subvolume's fs tree, which cannot be mediated in the
normal way via start_transaction. When quota groups (squota or qgroups)
are enabled, this reserves qgroup metadata of type PREALLOC. Once the
operation is associated to a transaction, we convert PREALLOC to
PERTRANS, which gets cleared in bulk at the end of the transaction.

However, the error paths of these three operations were not implementing
this lifecycle correctly. They unconditionally converted the PREALLOC to
PERTRANS in a generic cleanup step regardless of errors or whether the
operation was fully associated to a transaction or not. This resulted in
error paths occasionally converting this rsv to PERTRANS without calling
record_root_in_trans successfully, which meant that unless that root got
recorded in the transaction by some other thread, the end of the
transaction would not free that root's PERTRANS, leaking it. Ultimately,
this resulted in hitting a WARN in CONFIG_BTRFS_DEBUG builds at unmount
for the leaked reservation.

The fix is to ensure that every qgroup PREALLOC reservation observes the
following properties:

1. any failure before record_root_in_trans is called successfully
   results in freeing the PREALLOC reservation.
2. after record_root_in_trans, we convert to PERTRANS, and now the
   transaction owns freeing the reservation.

This patch enforces those properties on the three operations. Without
it, generic/269 with squotas enabled at mkfs time would fail in ~5-10
runs on my system. With this patch, it ran successfully 1000 times in a
row.</Note>
    </Notes>
    <CVE>CVE-2024-35956</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35956.html</URL>
        <Description>CVE-2024-35956</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224674</URL>
        <Description>SUSE Bug 1224674</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="154">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: ena: Fix incorrect descriptor free behavior

ENA has two types of TX queues:
- queues which only process TX packets arriving from the network stack
- queues which only process TX packets forwarded to it by XDP_REDIRECT
  or XDP_TX instructions

The ena_free_tx_bufs() cycles through all descriptors in a TX queue
and unmaps + frees every descriptor that hasn't been acknowledged yet
by the device (uncompleted TX transactions).
The function assumes that the processed TX queue is necessarily from
the first category listed above and ends up using napi_consume_skb()
for descriptors belonging to an XDP specific queue.

This patch solves a bug in which, in case of a VF reset, the
descriptors aren't freed correctly, leading to crashes.</Note>
    </Notes>
    <CVE>CVE-2024-35958</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35958.html</URL>
        <Description>CVE-2024-35958</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224677</URL>
        <Description>SUSE Bug 1224677</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="155">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Properly link new fs rules into the tree

Previously, add_rule_fg would only add newly created rules from the
handle into the tree when they had a refcount of 1. On the other hand,
create_flow_handle tries hard to find and reference already existing
identical rules instead of creating new ones.

These two behaviors can result in a situation where create_flow_handle
1) creates a new rule and references it, then
2) in a subsequent step during the same handle creation references it
   again,
resulting in a rule with a refcount of 2 that is not linked into the
tree, will have a NULL parent and root and will result in a crash when
the flow group is deleted because del_sw_hw_rule, invoked on rule
deletion, assumes node-&gt;parent is != NULL.

This happened in the wild, due to another bug related to incorrect
handling of duplicate pkt_reformat ids, which lead to the code in
create_flow_handle incorrectly referencing a just-added rule in the same
flow handle, resulting in the problem described above. Full details are
at [1].

This patch changes add_rule_fg to add new rules without parents into
the tree, properly initializing them and avoiding the crash. This makes
it more consistent with how rules are added to an FTE in
create_flow_handle.</Note>
    </Notes>
    <CVE>CVE-2024-35960</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35960.html</URL>
        <Description>CVE-2024-35960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224588</URL>
        <Description>SUSE Bug 1224588</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="156">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: complete validation of user input

In my recent commit, I missed that do_replace() handlers
use copy_from_sockptr() (which I fixed), followed
by unsafe copy_from_sockptr_offset() calls.

In all functions, we can perform the @optlen validation
before even calling xt_alloc_table_info() with the following
check:

if ((u64)optlen &lt; (u64)tmp.size + sizeof(tmp))
        return -EINVAL;</Note>
    </Notes>
    <CVE>CVE-2024-35962</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35962.html</URL>
        <Description>CVE-2024-35962</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224583</URL>
        <Description>SUSE Bug 1224583</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="157">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up

The flag I2C_HID_READ_PENDING is used to serialize I2C operations.
However, this is not necessary, because I2C core already has its own
locking for that.

More importantly, this flag can cause a lock-up: if the flag is set in
i2c_hid_xfer() and an interrupt happens, the interrupt handler
(i2c_hid_irq) will check this flag and return immediately without doing
anything, then the interrupt handler will be invoked again in an
infinite loop.

Since interrupt handler is an RT task, it takes over the CPU and the
flag-clearing task never gets scheduled, thus we have a lock-up.

Delete this unnecessary flag.</Note>
    </Notes>
    <CVE>CVE-2024-35997</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35997.html</URL>
        <Description>CVE-2024-35997</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224552</URL>
        <Description>SUSE Bug 1224552</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="158">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: honor table dormant flag from netdev release event path

Check for table dormant flag otherwise netdev release event path tries
to unregister an already unregistered hook.

[524854.857999] ------------[ cut here ]------------
[524854.858010] WARNING: CPU: 0 PID: 3386599 at net/netfilter/core.c:501 __nf_unregister_net_hook+0x21a/0x260
[...]
[524854.858848] CPU: 0 PID: 3386599 Comm: kworker/u32:2 Not tainted 6.9.0-rc3+ #365
[524854.858869] Workqueue: netns cleanup_net
[524854.858886] RIP: 0010:__nf_unregister_net_hook+0x21a/0x260
[524854.858903] Code: 24 e8 aa 73 83 ff 48 63 43 1c 83 f8 01 0f 85 3d ff ff ff e8 98 d1 f0 ff 48 8b 3c 24 e8 8f 73 83 ff 48 63 43 1c e9 26 ff ff ff &lt;0f&gt; 0b 48 83 c4 18 48 c7 c7 00 68 e9 82 5b 5d 41 5c 41 5d 41 5e 41
[524854.858914] RSP: 0018:ffff8881e36d79e0 EFLAGS: 00010246
[524854.858926] RAX: 0000000000000000 RBX: ffff8881339ae790 RCX: ffffffff81ba524a
[524854.858936] RDX: dffffc0000000000 RSI: 0000000000000008 RDI: ffff8881c8a16438
[524854.858945] RBP: ffff8881c8a16438 R08: 0000000000000001 R09: ffffed103c6daf34
[524854.858954] R10: ffff8881e36d79a7 R11: 0000000000000000 R12: 0000000000000005
[524854.858962] R13: ffff8881c8a16000 R14: 0000000000000000 R15: ffff8881351b5a00
[524854.858971] FS:  0000000000000000(0000) GS:ffff888390800000(0000) knlGS:0000000000000000
[524854.858982] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[524854.858991] CR2: 00007fc9be0f16f4 CR3: 00000001437cc004 CR4: 00000000001706f0
[524854.859000] Call Trace:
[524854.859006]  &lt;TASK&gt;
[524854.859013]  ? __warn+0x9f/0x1a0
[524854.859027]  ? __nf_unregister_net_hook+0x21a/0x260
[524854.859044]  ? report_bug+0x1b1/0x1e0
[524854.859060]  ? handle_bug+0x3c/0x70
[524854.859071]  ? exc_invalid_op+0x17/0x40
[524854.859083]  ? asm_exc_invalid_op+0x1a/0x20
[524854.859100]  ? __nf_unregister_net_hook+0x6a/0x260
[524854.859116]  ? __nf_unregister_net_hook+0x21a/0x260
[524854.859135]  nf_tables_netdev_event+0x337/0x390 [nf_tables]
[524854.859304]  ? __pfx_nf_tables_netdev_event+0x10/0x10 [nf_tables]
[524854.859461]  ? packet_notifier+0xb3/0x360
[524854.859476]  ? _raw_spin_unlock_irqrestore+0x11/0x40
[524854.859489]  ? dcbnl_netdevice_event+0x35/0x140
[524854.859507]  ? __pfx_nf_tables_netdev_event+0x10/0x10 [nf_tables]
[524854.859661]  notifier_call_chain+0x7d/0x140
[524854.859677]  unregister_netdevice_many_notify+0x5e1/0xae0</Note>
    </Notes>
    <CVE>CVE-2024-36005</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36005.html</URL>
        <Description>CVE-2024-36005</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224539</URL>
        <Description>SUSE Bug 1224539</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="159">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ipv4: check for NULL idev in ip_route_use_hint()

syzbot was able to trigger a NULL deref in fib_validate_source()
in an old tree [1].

It appears the bug exists in latest trees.

All calls to __in_dev_get_rcu() must be checked for a NULL result.

[1]
general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
CPU: 2 PID: 3257 Comm: syz-executor.3 Not tainted 5.10.0-syzkaller #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
 RIP: 0010:fib_validate_source+0xbf/0x15a0 net/ipv4/fib_frontend.c:425
Code: 18 f2 f2 f2 f2 42 c7 44 20 23 f3 f3 f3 f3 48 89 44 24 78 42 c6 44 20 27 f3 e8 5d 88 48 fc 4c 89 e8 48 c1 e8 03 48 89 44 24 18 &lt;42&gt; 80 3c 20 00 74 08 4c 89 ef e8 d2 15 98 fc 48 89 5c 24 10 41 bf
RSP: 0018:ffffc900015fee40 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffff88800f7a4000 RCX: ffff88800f4f90c0
RDX: 0000000000000000 RSI: 0000000004001eac RDI: ffff8880160c64c0
RBP: ffffc900015ff060 R08: 0000000000000000 R09: ffff88800f7a4000
R10: 0000000000000002 R11: ffff88800f4f90c0 R12: dffffc0000000000
R13: 0000000000000000 R14: 0000000000000000 R15: ffff88800f7a4000
FS:  00007f938acfe6c0(0000) GS:ffff888058c00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f938acddd58 CR3: 000000001248e000 CR4: 0000000000352ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
  ip_route_use_hint+0x410/0x9b0 net/ipv4/route.c:2231
  ip_rcv_finish_core+0x2c4/0x1a30 net/ipv4/ip_input.c:327
  ip_list_rcv_finish net/ipv4/ip_input.c:612 [inline]
  ip_sublist_rcv+0x3ed/0xe50 net/ipv4/ip_input.c:638
  ip_list_rcv+0x422/0x470 net/ipv4/ip_input.c:673
  __netif_receive_skb_list_ptype net/core/dev.c:5572 [inline]
  __netif_receive_skb_list_core+0x6b1/0x890 net/core/dev.c:5620
  __netif_receive_skb_list net/core/dev.c:5672 [inline]
  netif_receive_skb_list_internal+0x9f9/0xdc0 net/core/dev.c:5764
  netif_receive_skb_list+0x55/0x3e0 net/core/dev.c:5816
  xdp_recv_frames net/bpf/test_run.c:257 [inline]
  xdp_test_run_batch net/bpf/test_run.c:335 [inline]
  bpf_test_run_xdp_live+0x1818/0x1d00 net/bpf/test_run.c:363
  bpf_prog_test_run_xdp+0x81f/0x1170 net/bpf/test_run.c:1376
  bpf_prog_test_run+0x349/0x3c0 kernel/bpf/syscall.c:3736
  __sys_bpf+0x45c/0x710 kernel/bpf/syscall.c:5115
  __do_sys_bpf kernel/bpf/syscall.c:5201 [inline]
  __se_sys_bpf kernel/bpf/syscall.c:5199 [inline]
  __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5199</Note>
    </Notes>
    <CVE>CVE-2024-36008</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36008.html</URL>
        <Description>CVE-2024-36008</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224540</URL>
        <Description>SUSE Bug 1224540</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="160">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation

Each attribute inside a nested IFLA_VF_VLAN_LIST is assumed to be a
struct ifla_vf_vlan_info so the size of such attribute needs to be at least
of sizeof(struct ifla_vf_vlan_info) which is 14 bytes.
The current size validation in do_setvfinfo is against NLA_HDRLEN (4 bytes)
which is less than sizeof(struct ifla_vf_vlan_info) so this validation
is not enough and a too small attribute might be cast to a
struct ifla_vf_vlan_info, this might result in an out of bands
read access when accessing the saved (casted) entry in ivvl.</Note>
    </Notes>
    <CVE>CVE-2024-36017</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36017.html</URL>
        <Description>CVE-2024-36017</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225681</URL>
        <Description>SUSE Bug 1225681</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="161">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

i40e: fix vf may be used uninitialized in this function warning

To fix the regression introduced by commit 52424f974bc5, which causes
servers hang in very hard to reproduce conditions with resets races.
Using two sources for the information is the root cause.
In this function before the fix bumping v didn't mean bumping vf
pointer. But the code used this variables interchangeably, so stale vf
could point to different/not intended vf.

Remove redundant "v" variable and iterate via single VF pointer across
whole function instead to guarantee VF pointer validity.</Note>
    </Notes>
    <CVE>CVE-2024-36020</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36020.html</URL>
        <Description>CVE-2024-36020</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225698</URL>
        <Description>SUSE Bug 1225698</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="162">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: hns3: fix kernel crash when devlink reload during pf initialization

The devlink reload process will access the hardware resources,
but the register operation is done before the hardware is initialized.
So, processing the devlink reload during initialization may lead to kernel
crash. This patch fixes this by taking devl_lock during initialization.</Note>
    </Notes>
    <CVE>CVE-2024-36021</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36021.html</URL>
        <Description>CVE-2024-36021</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225699</URL>
        <Description>SUSE Bug 1225699</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="163">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix off by one in qla_edif_app_getstats()

The app_reply-&gt;elem[] array is allocated earlier in this function and it
has app_req.num_ports elements.  Thus this &gt; comparison needs to be &gt;= to
prevent memory corruption.</Note>
    </Notes>
    <CVE>CVE-2024-36025</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36025.html</URL>
        <Description>CVE-2024-36025</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225704</URL>
        <Description>SUSE Bug 1225704</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="164">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer

The TPM SPI transfer mechanism uses MAX_SPI_FRAMESIZE for computing the
maximum transfer length and the size of the transfer buffer. As such, it
does not account for the 4 bytes of header that prepends the SPI data
frame. This can result in out-of-bounds accesses and was confirmed with
KASAN.

Introduce SPI_HDRSIZE to account for the header and use to allocate the
transfer buffer.</Note>
    </Notes>
    <CVE>CVE-2024-36477</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36477.html</URL>
        <Description>CVE-2024-36477</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226840</URL>
        <Description>SUSE Bug 1226840</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="165">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

null_blk: fix null-ptr-dereference while configuring 'power' and 'submit_queues'

Writing 'power' and 'submit_queues' concurrently will trigger kernel
panic:

Test script:

modprobe null_blk nr_devices=0
mkdir -p /sys/kernel/config/nullb/nullb0
while true; do echo 1 &gt; submit_queues; echo 4 &gt; submit_queues; done &amp;
while true; do echo 1 &gt; power; echo 0 &gt; power; done

Test result:

BUG: kernel NULL pointer dereference, address: 0000000000000148
Oops: 0000 [#1] PREEMPT SMP
RIP: 0010:__lock_acquire+0x41d/0x28f0
Call Trace:
 &lt;TASK&gt;
 lock_acquire+0x121/0x450
 down_write+0x5f/0x1d0
 simple_recursive_removal+0x12f/0x5c0
 blk_mq_debugfs_unregister_hctxs+0x7c/0x100
 blk_mq_update_nr_hw_queues+0x4a3/0x720
 nullb_update_nr_hw_queues+0x71/0xf0 [null_blk]
 nullb_device_submit_queues_store+0x79/0xf0 [null_blk]
 configfs_write_iter+0x119/0x1e0
 vfs_write+0x326/0x730
 ksys_write+0x74/0x150

This is because del_gendisk() can concurrent with
blk_mq_update_nr_hw_queues():

nullb_device_power_store	nullb_apply_submit_queues
 null_del_dev
 del_gendisk
				 nullb_update_nr_hw_queues
				  if (!dev-&gt;nullb)
				  // still set while gendisk is deleted
				   return 0
				  blk_mq_update_nr_hw_queues
 dev-&gt;nullb = NULL

Fix this problem by resuing the global mutex to protect
nullb_device_power_store() and nullb_update_nr_hw_queues() from configfs.</Note>
    </Notes>
    <CVE>CVE-2024-36478</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36478.html</URL>
        <Description>CVE-2024-36478</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226841</URL>
        <Description>SUSE Bug 1226841</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="166">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

fpga: bridge: add owner module and take its refcount

The current implementation of the fpga bridge assumes that the low-level
module registers a driver for the parent device and uses its owner pointer
to take the module's refcount. This approach is problematic since it can
lead to a null pointer dereference while attempting to get the bridge if
the parent device does not have a driver.

To address this problem, add a module owner pointer to the fpga_bridge
struct and use it to take the module's refcount. Modify the function for
registering a bridge to take an additional owner module parameter and
rename it to avoid conflicts. Use the old function name for a helper macro
that automatically sets the module that registers the bridge as the owner.
This ensures compatibility with existing low-level control modules and
reduces the chances of registering a bridge without setting the owner.

Also, update the documentation to keep it consistent with the new interface
for registering an fpga bridge.

Other changes: opportunistically move put_device() from __fpga_bridge_get()
to fpga_bridge_get() and of_fpga_bridge_get() to improve code clarity since
the bridge device is taken in these functions.</Note>
    </Notes>
    <CVE>CVE-2024-36479</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36479.html</URL>
        <Description>CVE-2024-36479</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226949</URL>
        <Description>SUSE Bug 1226949</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="167">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mm/slab: make __free(kfree) accept error pointers

Currently, if an automatically freed allocation is an error pointer that
will lead to a crash.  An example of this is in wm831x_gpio_dbg_show().

   171	char *label __free(kfree) = gpiochip_dup_line_label(chip, i);
   172	if (IS_ERR(label)) {
   173		dev_err(wm831x-&gt;dev, "Failed to duplicate label\n");
   174		continue;
   175  }

The auto clean up function should check for error pointers as well,
otherwise we're going to keep hitting issues like this.</Note>
    </Notes>
    <CVE>CVE-2024-36890</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36890.html</URL>
        <Description>CVE-2024-36890</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225714</URL>
        <Description>SUSE Bug 1225714</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="168">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete

FFS based applications can utilize the aio_cancel() callback to dequeue
pending USB requests submitted to the UDC.  There is a scenario where the
FFS application issues an AIO cancel call, while the UDC is handling a
soft disconnect.  For a DWC3 based implementation, the callstack looks
like the following:

    DWC3 Gadget                               FFS Application
dwc3_gadget_soft_disconnect()              ...
  --&gt; dwc3_stop_active_transfers()
    --&gt; dwc3_gadget_giveback(-ESHUTDOWN)
      --&gt; ffs_epfile_async_io_complete()   ffs_aio_cancel()
        --&gt; usb_ep_free_request()            --&gt; usb_ep_dequeue()

There is currently no locking implemented between the AIO completion
handler and AIO cancel, so the issue occurs if the completion routine is
running in parallel to an AIO cancel call coming from the FFS application.
As the completion call frees the USB request (io_data-&gt;req) the FFS
application is also referencing it for the usb_ep_dequeue() call.  This can
lead to accessing a stale/hanging pointer.

commit b566d38857fc ("usb: gadget: f_fs: use io_data-&gt;status consistently")
relocated the usb_ep_free_request() into ffs_epfile_async_io_complete().
However, in order to properly implement locking to mitigate this issue, the
spinlock can't be added to ffs_epfile_async_io_complete(), as
usb_ep_dequeue() (if successfully dequeuing a USB request) will call the
function driver's completion handler in the same context.  Hence, leading
into a deadlock.

Fix this issue by moving the usb_ep_free_request() back to
ffs_user_copy_worker(), and ensuring that it explicitly sets io_data-&gt;req
to NULL after freeing it within the ffs-&gt;eps_lock.  This resolves the race
condition above, as the ffs_aio_cancel() routine will not continue
attempting to dequeue a request that has already been freed, or the
ffs_user_copy_work() not freeing the USB request until the AIO cancel is
done referencing it.

This fix depends on
  commit b566d38857fc ("usb: gadget: f_fs: use io_data-&gt;status
  consistently")</Note>
    </Notes>
    <CVE>CVE-2024-36894</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36894.html</URL>
        <Description>CVE-2024-36894</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225749</URL>
        <Description>SUSE Bug 1225749</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226139</URL>
        <Description>SUSE Bug 1226139</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="169">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

gpiolib: cdev: Fix use after free in lineinfo_changed_notify

The use-after-free issue occurs as follows: when the GPIO chip device file
is being closed by invoking gpio_chrdev_release(), watched_lines is freed
by bitmap_free(), but the unregistration of lineinfo_changed_nb notifier
chain failed due to waiting write rwsem. Additionally, one of the GPIO
chip's lines is also in the release process and holds the notifier chain's
read rwsem. Consequently, a race condition leads to the use-after-free of
watched_lines.

Here is the typical stack when issue happened:

[free]
gpio_chrdev_release()
  --&gt; bitmap_free(cdev-&gt;watched_lines)                  &lt;-- freed
  --&gt; blocking_notifier_chain_unregister()
    --&gt; down_write(&amp;nh-&gt;rwsem)                          &lt;-- waiting rwsem
          --&gt; __down_write_common()
            --&gt; rwsem_down_write_slowpath()
                  --&gt; schedule_preempt_disabled()
                    --&gt; schedule()

[use]
st54spi_gpio_dev_release()
  --&gt; gpio_free()
    --&gt; gpiod_free()
      --&gt; gpiod_free_commit()
        --&gt; gpiod_line_state_notify()
          --&gt; blocking_notifier_call_chain()
            --&gt; down_read(&amp;nh-&gt;rwsem);                  &lt;-- held rwsem
            --&gt; notifier_call_chain()
              --&gt; lineinfo_changed_notify()
                --&gt; test_bit(xxxx, cdev-&gt;watched_lines) &lt;-- use after free

The side effect of the use-after-free issue is that a GPIO line event is
being generated for userspace where it shouldn't. However, since the chrdev
is being closed, userspace won't have the chance to read that event anyway.

To fix the issue, call the bitmap_free() function after the unregistration
of lineinfo_changed_nb notifier chain.</Note>
    </Notes>
    <CVE>CVE-2024-36899</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36899.html</URL>
        <Description>CVE-2024-36899</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225737</URL>
        <Description>SUSE Bug 1225737</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225739</URL>
        <Description>SUSE Bug 1225739</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="170">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: hns3: fix kernel crash when devlink reload during initialization

The devlink reload process will access the hardware resources,
but the register operation is done before the hardware is initialized.
So, processing the devlink reload during initialization may lead to kernel
crash.

This patch fixes this by registering the devlink after
hardware initialization.</Note>
    </Notes>
    <CVE>CVE-2024-36900</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36900.html</URL>
        <Description>CVE-2024-36900</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225726</URL>
        <Description>SUSE Bug 1225726</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="171">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tcp: Use refcount_inc_not_zero() in tcp_twsk_unique().

Anderson Nascimento reported a use-after-free splat in tcp_twsk_unique()
with nice analysis.

Since commit ec94c2696f0b ("tcp/dccp: avoid one atomic operation for
timewait hashdance"), inet_twsk_hashdance() sets TIME-WAIT socket's
sk_refcnt after putting it into ehash and releasing the bucket lock.

Thus, there is a small race window where other threads could try to
reuse the port during connect() and call sock_hold() in tcp_twsk_unique()
for the TIME-WAIT socket with zero refcnt.

If that happens, the refcnt taken by tcp_twsk_unique() is overwritten
and sock_put() will cause underflow, triggering a real use-after-free
somewhere else.

To avoid the use-after-free, we need to use refcount_inc_not_zero() in
tcp_twsk_unique() and give up on reusing the port if it returns false.

[0]:
refcount_t: addition on 0; use-after-free.
WARNING: CPU: 0 PID: 1039313 at lib/refcount.c:25 refcount_warn_saturate+0xe5/0x110
CPU: 0 PID: 1039313 Comm: trigger Not tainted 6.8.6-200.fc39.x86_64 #1
Hardware name: VMware, Inc. VMware20,1/440BX Desktop Reference Platform, BIOS VMW201.00V.21805430.B64.2305221830 05/22/2023
RIP: 0010:refcount_warn_saturate+0xe5/0x110
Code: 42 8e ff 0f 0b c3 cc cc cc cc 80 3d aa 13 ea 01 00 0f 85 5e ff ff ff 48 c7 c7 f8 8e b7 82 c6 05 96 13 ea 01 01 e8 7b 42 8e ff &lt;0f&gt; 0b c3 cc cc cc cc 48 c7 c7 50 8f b7 82 c6 05 7a 13 ea 01 01 e8
RSP: 0018:ffffc90006b43b60 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffff888009bb3ef0 RCX: 0000000000000027
RDX: ffff88807be218c8 RSI: 0000000000000001 RDI: ffff88807be218c0
RBP: 0000000000069d70 R08: 0000000000000000 R09: ffffc90006b439f0
R10: ffffc90006b439e8 R11: 0000000000000003 R12: ffff8880029ede84
R13: 0000000000004e20 R14: ffffffff84356dc0 R15: ffff888009bb3ef0
FS:  00007f62c10926c0(0000) GS:ffff88807be00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020ccb000 CR3: 000000004628c005 CR4: 0000000000f70ef0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 ? refcount_warn_saturate+0xe5/0x110
 ? __warn+0x81/0x130
 ? refcount_warn_saturate+0xe5/0x110
 ? report_bug+0x171/0x1a0
 ? refcount_warn_saturate+0xe5/0x110
 ? handle_bug+0x3c/0x80
 ? exc_invalid_op+0x17/0x70
 ? asm_exc_invalid_op+0x1a/0x20
 ? refcount_warn_saturate+0xe5/0x110
 tcp_twsk_unique+0x186/0x190
 __inet_check_established+0x176/0x2d0
 __inet_hash_connect+0x74/0x7d0
 ? __pfx___inet_check_established+0x10/0x10
 tcp_v4_connect+0x278/0x530
 __inet_stream_connect+0x10f/0x3d0
 inet_stream_connect+0x3a/0x60
 __sys_connect+0xa8/0xd0
 __x64_sys_connect+0x18/0x20
 do_syscall_64+0x83/0x170
 entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7f62c11a885d
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d a3 45 0c 00 f7 d8 64 89 01 48
RSP: 002b:00007f62c1091e58 EFLAGS: 00000296 ORIG_RAX: 000000000000002a
RAX: ffffffffffffffda RBX: 0000000020ccb004 RCX: 00007f62c11a885d
RDX: 0000000000000010 RSI: 0000000020ccb000 RDI: 0000000000000003
RBP: 00007f62c1091e90 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000296 R12: 00007f62c10926c0
R13: ffffffffffffff88 R14: 0000000000000000 R15: 00007ffe237885b0
 &lt;/TASK&gt;</Note>
    </Notes>
    <CVE>CVE-2024-36904</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36904.html</URL>
        <Description>CVE-2024-36904</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225732</URL>
        <Description>SUSE Bug 1225732</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225733</URL>
        <Description>SUSE Bug 1225733</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="172">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies

syzbot reported unsafe calls to copy_from_sockptr() [1]

Use copy_safe_from_sockptr() instead.

[1]

BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]
 BUG: KASAN: slab-out-of-bounds in copy_from_sockptr include/linux/sockptr.h:55 [inline]
 BUG: KASAN: slab-out-of-bounds in nfc_llcp_setsockopt+0x6c2/0x850 net/nfc/llcp_sock.c:255
Read of size 4 at addr ffff88801caa1ec3 by task syz-executor459/5078

CPU: 0 PID: 5078 Comm: syz-executor459 Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Call Trace:
 &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:88 [inline]
  dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
  print_address_description mm/kasan/report.c:377 [inline]
  print_report+0x169/0x550 mm/kasan/report.c:488
  kasan_report+0x143/0x180 mm/kasan/report.c:601
  copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]
  copy_from_sockptr include/linux/sockptr.h:55 [inline]
  nfc_llcp_setsockopt+0x6c2/0x850 net/nfc/llcp_sock.c:255
  do_sock_setsockopt+0x3b1/0x720 net/socket.c:2311
  __sys_setsockopt+0x1ae/0x250 net/socket.c:2334
  __do_sys_setsockopt net/socket.c:2343 [inline]
  __se_sys_setsockopt net/socket.c:2340 [inline]
  __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340
 do_syscall_64+0xfd/0x240
 entry_SYSCALL_64_after_hwframe+0x6d/0x75
RIP: 0033:0x7f7fac07fd89
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 91 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fff660eb788 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f7fac07fd89
RDX: 0000000000000000 RSI: 0000000000000118 RDI: 0000000000000004
RBP: 0000000000000000 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000020000a80 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000</Note>
    </Notes>
    <CVE>CVE-2024-36915</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36915.html</URL>
        <Description>CVE-2024-36915</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225758</URL>
        <Description>SUSE Bug 1225758</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="173">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

blk-iocost: avoid out of bounds shift

UBSAN catches undefined behavior in blk-iocost, where sometimes
iocg-&gt;delay is shifted right by a number that is too large,
resulting in undefined behavior on some architectures.

[  186.556576] ------------[ cut here ]------------
UBSAN: shift-out-of-bounds in block/blk-iocost.c:1366:23
shift exponent 64 is too large for 64-bit type 'u64' (aka 'unsigned long long')
CPU: 16 PID: 0 Comm: swapper/16 Tainted: G S          E    N 6.9.0-0_fbk700_debug_rc2_kbuilder_0_gc85af715cac0 #1
Hardware name: Quanta Twin Lakes MP/Twin Lakes Passive MP, BIOS F09_3A23 12/08/2020
Call Trace:
 &lt;IRQ&gt;
 dump_stack_lvl+0x8f/0xe0
 __ubsan_handle_shift_out_of_bounds+0x22c/0x280
 iocg_kick_delay+0x30b/0x310
 ioc_timer_fn+0x2fb/0x1f80
 __run_timer_base+0x1b6/0x250
...

Avoid that undefined behavior by simply taking the
"delay = 0" branch if the shift is too large.

I am not sure what the symptoms of an undefined value
delay will be, but I suspect it could be more than a
little annoying to debug.</Note>
    </Notes>
    <CVE>CVE-2024-36916</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36916.html</URL>
        <Description>CVE-2024-36916</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225759</URL>
        <Description>SUSE Bug 1225759</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="174">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

block: fix overflow in blk_ioctl_discard()

There is no check for overflow of 'start + len' in blk_ioctl_discard().
Hung task occurs if submit an discard ioctl with the following param:
  start = 0x80000000000ff000, len = 0x8000000000fff000;
Add the overflow validation now.</Note>
    </Notes>
    <CVE>CVE-2024-36917</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36917.html</URL>
        <Description>CVE-2024-36917</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225770</URL>
        <Description>SUSE Bug 1225770</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="175">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload

The session resources are used by FW and driver when session is offloaded,
once session is uploaded these resources are not used. The lock is not
required as these fields won't be used any longer. The offload and upload
calls are sequential, hence lock is not required.

This will suppress following BUG_ON():

[  449.843143] ------------[ cut here ]------------
[  449.848302] kernel BUG at mm/vmalloc.c:2727!
[  449.853072] invalid opcode: 0000 [#1] PREEMPT SMP PTI
[  449.858712] CPU: 5 PID: 1996 Comm: kworker/u24:2 Not tainted 5.14.0-118.el9.x86_64 #1
Rebooting.
[  449.867454] Hardware name: Dell Inc. PowerEdge R730/0WCJNT, BIOS 2.3.4 11/08/2016
[  449.876966] Workqueue: fc_rport_eq fc_rport_work [libfc]
[  449.882910] RIP: 0010:vunmap+0x2e/0x30
[  449.887098] Code: 00 65 8b 05 14 a2 f0 4a a9 00 ff ff 00 75 1b 55 48 89 fd e8 34 36 79 00 48 85 ed 74 0b 48 89 ef 31 f6 5d e9 14 fc ff ff 5d c3 &lt;0f&gt; 0b 0f 1f 44 00 00 41 57 41 56 49 89 ce 41 55 49 89 fd 41 54 41
[  449.908054] RSP: 0018:ffffb83d878b3d68 EFLAGS: 00010206
[  449.913887] RAX: 0000000080000201 RBX: ffff8f4355133550 RCX: 000000000d400005
[  449.921843] RDX: 0000000000000001 RSI: 0000000000001000 RDI: ffffb83da53f5000
[  449.929808] RBP: ffff8f4ac6675800 R08: ffffb83d878b3d30 R09: 00000000000efbdf
[  449.937774] R10: 0000000000000003 R11: ffff8f434573e000 R12: 0000000000001000
[  449.945736] R13: 0000000000001000 R14: ffffb83da53f5000 R15: ffff8f43d4ea3ae0
[  449.953701] FS:  0000000000000000(0000) GS:ffff8f529fc80000(0000) knlGS:0000000000000000
[  449.962732] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  449.969138] CR2: 00007f8cf993e150 CR3: 0000000efbe10003 CR4: 00000000003706e0
[  449.977102] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  449.985065] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  449.993028] Call Trace:
[  449.995756]  __iommu_dma_free+0x96/0x100
[  450.000139]  bnx2fc_free_session_resc+0x67/0x240 [bnx2fc]
[  450.006171]  bnx2fc_upload_session+0xce/0x100 [bnx2fc]
[  450.011910]  bnx2fc_rport_event_handler+0x9f/0x240 [bnx2fc]
[  450.018136]  fc_rport_work+0x103/0x5b0 [libfc]
[  450.023103]  process_one_work+0x1e8/0x3c0
[  450.027581]  worker_thread+0x50/0x3b0
[  450.031669]  ? rescuer_thread+0x370/0x370
[  450.036143]  kthread+0x149/0x170
[  450.039744]  ? set_kthread_struct+0x40/0x40
[  450.044411]  ret_from_fork+0x22/0x30
[  450.048404] Modules linked in: vfat msdos fat xfs nfs_layout_nfsv41_files rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver dm_service_time qedf qed crc8 bnx2fc libfcoe libfc scsi_transport_fc intel_rapl_msr intel_rapl_common x86_pkg_temp_thermal intel_powerclamp dcdbas rapl intel_cstate intel_uncore mei_me pcspkr mei ipmi_ssif lpc_ich ipmi_si fuse zram ext4 mbcache jbd2 loop nfsv3 nfs_acl nfs lockd grace fscache netfs irdma ice sd_mod t10_pi sg ib_uverbs ib_core 8021q garp mrp stp llc mgag200 i2c_algo_bit drm_kms_helper syscopyarea sysfillrect sysimgblt mxm_wmi fb_sys_fops cec crct10dif_pclmul ahci crc32_pclmul bnx2x drm ghash_clmulni_intel libahci rfkill i40e libata megaraid_sas mdio wmi sunrpc lrw dm_crypt dm_round_robin dm_multipath dm_snapshot dm_bufio dm_mirror dm_region_hash dm_log dm_zero dm_mod linear raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx raid6_pq libcrc32c crc32c_intel raid1 raid0 iscsi_ibft squashfs be2iscsi bnx2i cnic uio cxgb4i cxgb4 tls
[  450.048497]  libcxgbi libcxgb qla4xxx iscsi_boot_sysfs iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi edd ipmi_devintf ipmi_msghandler
[  450.159753] ---[ end trace 712de2c57c64abc8 ]---</Note>
    </Notes>
    <CVE>CVE-2024-36919</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36919.html</URL>
        <Description>CVE-2024-36919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225767</URL>
        <Description>SUSE Bug 1225767</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="176">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bna: ensure the copied buf is NUL terminated

Currently, we allocate a nbytes-sized kernel buffer and copy nbytes from
userspace to that buffer. Later, we use sscanf on this buffer but we don't
ensure that the string is terminated inside the buffer, this can lead to
OOB read when using sscanf. Fix this issue by using memdup_user_nul
instead of memdup_user.</Note>
    </Notes>
    <CVE>CVE-2024-36934</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36934.html</URL>
        <Description>CVE-2024-36934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225760</URL>
        <Description>SUSE Bug 1225760</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="177">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

xdp: use flags field to disambiguate broadcast redirect

When redirecting a packet using XDP, the bpf_redirect_map() helper will set
up the redirect destination information in struct bpf_redirect_info (using
the __bpf_xdp_redirect_map() helper function), and the xdp_do_redirect()
function will read this information after the XDP program returns and pass
the frame on to the right redirect destination.

When using the BPF_F_BROADCAST flag to do multicast redirect to a whole
map, __bpf_xdp_redirect_map() sets the 'map' pointer in struct
bpf_redirect_info to point to the destination map to be broadcast. And
xdp_do_redirect() reacts to the value of this map pointer to decide whether
it's dealing with a broadcast or a single-value redirect. However, if the
destination map is being destroyed before xdp_do_redirect() is called, the
map pointer will be cleared out (by bpf_clear_redirect_map()) without
waiting for any XDP programs to stop running. This causes xdp_do_redirect()
to think that the redirect was to a single target, but the target pointer
is also NULL (since broadcast redirects don't have a single target), so
this causes a crash when a NULL pointer is passed to dev_map_enqueue().

To fix this, change xdp_do_redirect() to react directly to the presence of
the BPF_F_BROADCAST flag in the 'flags' value in struct bpf_redirect_info
to disambiguate between a single-target and a broadcast redirect. And only
read the 'map' pointer if the broadcast flag is set, aborting if that has
been cleared out in the meantime. This prevents the crash, while keeping
the atomic (cmpxchg-based) clearing of the map pointer itself, and without
adding any more checks in the non-broadcast fast path.</Note>
    </Notes>
    <CVE>CVE-2024-36937</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36937.html</URL>
        <Description>CVE-2024-36937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225834</URL>
        <Description>SUSE Bug 1225834</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="178">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

pinctrl: core: delete incorrect free in pinctrl_enable()

The "pctldev" struct is allocated in devm_pinctrl_register_and_init().
It's a devm_ managed pointer that is freed by devm_pinctrl_dev_release(),
so freeing it in pinctrl_enable() will lead to a double free.

The devm_pinctrl_dev_release() function frees the pindescs and destroys
the mutex as well.</Note>
    </Notes>
    <CVE>CVE-2024-36940</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36940.html</URL>
        <Description>CVE-2024-36940</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225840</URL>
        <Description>SUSE Bug 1225840</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225841</URL>
        <Description>SUSE Bug 1225841</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="179">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix neighbour and rtable leak in smc_ib_find_route()

In smc_ib_find_route(), the neighbour found by neigh_lookup() and rtable
resolved by ip_route_output_flow() are not released or put before return.
It may cause the refcount leak, so fix it.</Note>
    </Notes>
    <CVE>CVE-2024-36945</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36945.html</URL>
        <Description>CVE-2024-36945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225823</URL>
        <Description>SUSE Bug 1225823</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="180">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

amd/amdkfd: sync all devices to wait all processes being evicted

If there are more than one device doing reset in parallel, the first
device will call kfd_suspend_all_processes() to evict all processes
on all devices, this call takes time to finish. other device will
start reset and recover without waiting. if the process has not been
evicted before doing recover, it will be restored, then caused page
fault.</Note>
    </Notes>
    <CVE>CVE-2024-36949</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36949.html</URL>
        <Description>CVE-2024-36949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225894</URL>
        <Description>SUSE Bug 1225894</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="181">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Fix invalid reads in fence signaled events

Correctly set the length of the drm_event to the size of the structure
that's actually used.

The length of the drm_event was set to the parent structure instead of
to the drm_vmw_event_fence which is supposed to be read. drm_read
uses the length parameter to copy the event to the user space thus
resuling in oob reads.</Note>
    </Notes>
    <CVE>CVE-2024-36960</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36960.html</URL>
        <Description>CVE-2024-36960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225872</URL>
        <Description>SUSE Bug 1225872</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="182">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

fs/9p: only translate RWX permissions for plain 9P2000

Garbage in plain 9P2000's perm bits is allowed through, which causes it
to be able to set (among others) the suid bit. This was presumably not
the intent since the unix extended bits are handled explicitly and
conditionally on .u.</Note>
    </Notes>
    <CVE>CVE-2024-36964</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36964.html</URL>
        <Description>CVE-2024-36964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225866</URL>
        <Description>SUSE Bug 1225866</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226325</URL>
        <Description>SUSE Bug 1226325</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="183">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

remoteproc: mediatek: Make sure IPI buffer fits in L2TCM

The IPI buffer location is read from the firmware that we load to the
System Companion Processor, and it's not granted that both the SRAM
(L2TCM) size that is defined in the devicetree node is large enough
for that, and while this is especially true for multi-core SCP, it's
still useful to check on single-core variants as well.

Failing to perform this check may make this driver perform R/W
operations out of the L2TCM boundary, resulting (at best) in a
kernel panic.

To fix that, check that the IPI buffer fits, otherwise return a
failure and refuse to boot the relevant SCP core (or the SCP at
all, if this is single core).</Note>
    </Notes>
    <CVE>CVE-2024-36965</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36965.html</URL>
        <Description>CVE-2024-36965</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226149</URL>
        <Description>SUSE Bug 1226149</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="184">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

KEYS: trusted: Fix memory leak in tpm2_key_encode()

'scratch' is never freed. Fix this by calling kfree() in the success, and
in the error case.</Note>
    </Notes>
    <CVE>CVE-2024-36967</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36967.html</URL>
        <Description>CVE-2024-36967</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226131</URL>
        <Description>SUSE Bug 1226131</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="185">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix division by zero in setup_dsc_config

When slice_height is 0, the division by slice_height in the calculation
of the number of slices will cause a division by zero driver crash. This
leaves the kernel in a state that requires a reboot. This patch adds a
check to avoid the division by zero.

The stack trace below is for the 6.8.4 Kernel. I reproduced the issue on
a Z16 Gen 2 Lenovo Thinkpad with a Apple Studio Display monitor
connected via Thunderbolt. The amdgpu driver crashed with this exception
when I rebooted the system with the monitor connected.

kernel: ? die (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:434 arch/x86/kernel/dumpstack.c:447)
kernel: ? do_trap (arch/x86/kernel/traps.c:113 arch/x86/kernel/traps.c:154)
kernel: ? setup_dsc_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1053) amdgpu
kernel: ? do_error_trap (./arch/x86/include/asm/traps.h:58 arch/x86/kernel/traps.c:175)
kernel: ? setup_dsc_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1053) amdgpu
kernel: ? exc_divide_error (arch/x86/kernel/traps.c:194 (discriminator 2))
kernel: ? setup_dsc_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1053) amdgpu
kernel: ? asm_exc_divide_error (./arch/x86/include/asm/idtentry.h:548)
kernel: ? setup_dsc_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1053) amdgpu
kernel: dc_dsc_compute_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1109) amdgpu

After applying this patch, the driver no longer crashes when the monitor
is connected and the system is rebooted. I believe this is the same
issue reported for 3113.</Note>
    </Notes>
    <CVE>CVE-2024-36969</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36969.html</URL>
        <Description>CVE-2024-36969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226155</URL>
        <Description>SUSE Bug 1226155</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="186">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: fix __dst_negative_advice() race

__dst_negative_advice() does not enforce proper RCU rules when
sk-&gt;dst_cache must be cleared, leading to possible UAF.

RCU rules are that we must first clear sk-&gt;sk_dst_cache,
then call dst_release(old_dst).

Note that sk_dst_reset(sk) is implementing this protocol correctly,
while __dst_negative_advice() uses the wrong order.

Given that ip6_negative_advice() has special logic
against RTF_CACHE, this means each of the three -&gt;negative_advice()
existing methods must perform the sk_dst_reset() themselves.

Note the check against NULL dst is centralized in
__dst_negative_advice(), there is no need to duplicate
it in various callbacks.

Many thanks to Clement Lecigne for tracking this issue.

This old bug became visible after the blamed commit, using UDP sockets.</Note>
    </Notes>
    <CVE>CVE-2024-36971</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36971.html</URL>
        <Description>CVE-2024-36971</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226145</URL>
        <Description>SUSE Bug 1226145</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226324</URL>
        <Description>SUSE Bug 1226324</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="187">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

KEYS: trusted: Do not use WARN when encode fails

When asn1_encode_sequence() fails, WARN is not the correct solution.

1. asn1_encode_sequence() is not an internal function (located
   in lib/asn1_encode.c).
2. Location is known, which makes the stack trace useless.
3. Results a crash if panic_on_warn is set.

It is also noteworthy that the use of WARN is undocumented, and it
should be avoided unless there is a carefully considered rationale to
use it.

Replace WARN with pr_err, and print the return value instead, which is
only useful piece of information.</Note>
    </Notes>
    <CVE>CVE-2024-36975</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36975.html</URL>
        <Description>CVE-2024-36975</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226520</URL>
        <Description>SUSE Bug 1226520</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="188">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: sched: sch_multiq: fix possible OOB write in multiq_tune()

q-&gt;bands will be assigned to qopt-&gt;bands to execute subsequent code logic
after kmalloc. So the old q-&gt;bands should not be used in kmalloc.
Otherwise, an out-of-bounds write will occur.</Note>
    </Notes>
    <CVE>CVE-2024-36978</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36978.html</URL>
        <Description>CVE-2024-36978</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226514</URL>
        <Description>SUSE Bug 1226514</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="189">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

fpga: manager: add owner module and take its refcount

The current implementation of the fpga manager assumes that the low-level
module registers a driver for the parent device and uses its owner pointer
to take the module's refcount. This approach is problematic since it can
lead to a null pointer dereference while attempting to get the manager if
the parent device does not have a driver.

To address this problem, add a module owner pointer to the fpga_manager
struct and use it to take the module's refcount. Modify the functions for
registering the manager to take an additional owner module parameter and
rename them to avoid conflicts. Use the old function names for helper
macros that automatically set the module that registers the manager as the
owner. This ensures compatibility with existing low-level control modules
and reduces the chances of registering a manager without setting the owner.

Also, update the documentation to keep it consistent with the new interface
for registering an fpga manager.

Other changes: opportunistically move put_device() from __fpga_mgr_get() to
fpga_mgr_get() and of_fpga_mgr_get() to improve code clarity since the
manager device is taken in these functions.</Note>
    </Notes>
    <CVE>CVE-2024-37021</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-37021.html</URL>
        <Description>CVE-2024-37021</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226950</URL>
        <Description>SUSE Bug 1226950</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="190">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix potential kernel bug due to lack of writeback flag waiting

Destructive writes to a block device on which nilfs2 is mounted can cause
a kernel bug in the folio/page writeback start routine or writeback end
routine (__folio_start_writeback in the log below):

 kernel BUG at mm/page-writeback.c:3070!
 Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI
 ...
 RIP: 0010:__folio_start_writeback+0xbaa/0x10e0
 Code: 25 ff 0f 00 00 0f 84 18 01 00 00 e8 40 ca c6 ff e9 17 f6 ff ff
  e8 36 ca c6 ff 4c 89 f7 48 c7 c6 80 c0 12 84 e8 e7 b3 0f 00 90 &lt;0f&gt;
  0b e8 1f ca c6 ff 4c 89 f7 48 c7 c6 a0 c6 12 84 e8 d0 b3 0f 00
 ...
 Call Trace:
  &lt;TASK&gt;
  nilfs_segctor_do_construct+0x4654/0x69d0 [nilfs2]
  nilfs_segctor_construct+0x181/0x6b0 [nilfs2]
  nilfs_segctor_thread+0x548/0x11c0 [nilfs2]
  kthread+0x2f0/0x390
  ret_from_fork+0x4b/0x80
  ret_from_fork_asm+0x1a/0x30
  &lt;/TASK&gt;

This is because when the log writer starts a writeback for segment summary
blocks or a super root block that use the backing device's page cache, it
does not wait for the ongoing folio/page writeback, resulting in an
inconsistent writeback state.

Fix this issue by waiting for ongoing writebacks when putting
folios/pages on the backing device into writeback state.</Note>
    </Notes>
    <CVE>CVE-2024-37078</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-37078.html</URL>
        <Description>CVE-2024-37078</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227066</URL>
        <Description>SUSE Bug 1227066</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="191">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix crash on racing fsync and size-extending write into prealloc

We have been seeing crashes on duplicate keys in
btrfs_set_item_key_safe():

  BTRFS critical (device vdb): slot 4 key (450 108 8192) new key (450 108 8192)
  ------------[ cut here ]------------
  kernel BUG at fs/btrfs/ctree.c:2620!
  invalid opcode: 0000 [#1] PREEMPT SMP PTI
  CPU: 0 PID: 3139 Comm: xfs_io Kdump: loaded Not tainted 6.9.0 #6
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014
  RIP: 0010:btrfs_set_item_key_safe+0x11f/0x290 [btrfs]

With the following stack trace:

  #0  btrfs_set_item_key_safe (fs/btrfs/ctree.c:2620:4)
  #1  btrfs_drop_extents (fs/btrfs/file.c:411:4)
  #2  log_one_extent (fs/btrfs/tree-log.c:4732:9)
  #3  btrfs_log_changed_extents (fs/btrfs/tree-log.c:4955:9)
  #4  btrfs_log_inode (fs/btrfs/tree-log.c:6626:9)
  #5  btrfs_log_inode_parent (fs/btrfs/tree-log.c:7070:8)
  #6  btrfs_log_dentry_safe (fs/btrfs/tree-log.c:7171:8)
  #7  btrfs_sync_file (fs/btrfs/file.c:1933:8)
  #8  vfs_fsync_range (fs/sync.c:188:9)
  #9  vfs_fsync (fs/sync.c:202:9)
  #10 do_fsync (fs/sync.c:212:9)
  #11 __do_sys_fdatasync (fs/sync.c:225:9)
  #12 __se_sys_fdatasync (fs/sync.c:223:1)
  #13 __x64_sys_fdatasync (fs/sync.c:223:1)
  #14 do_syscall_x64 (arch/x86/entry/common.c:52:14)
  #15 do_syscall_64 (arch/x86/entry/common.c:83:7)
  #16 entry_SYSCALL_64+0xaf/0x14c (arch/x86/entry/entry_64.S:121)

So we're logging a changed extent from fsync, which is splitting an
extent in the log tree. But this split part already exists in the tree,
triggering the BUG().

This is the state of the log tree at the time of the crash, dumped with
drgn (https://github.com/osandov/drgn/blob/main/contrib/btrfs_tree.py)
to get more details than btrfs_print_leaf() gives us:

  &gt;&gt;&gt; print_extent_buffer(prog.crashed_thread().stack_trace()[0]["eb"])
  leaf 33439744 level 0 items 72 generation 9 owner 18446744073709551610
  leaf 33439744 flags 0x100000000000000
  fs uuid e5bd3946-400c-4223-8923-190ef1f18677
  chunk uuid d58cb17e-6d02-494a-829a-18b7d8a399da
          item 0 key (450 INODE_ITEM 0) itemoff 16123 itemsize 160
                  generation 7 transid 9 size 8192 nbytes 8473563889606862198
                  block group 0 mode 100600 links 1 uid 0 gid 0 rdev 0
                  sequence 204 flags 0x10(PREALLOC)
                  atime 1716417703.220000000 (2024-05-22 15:41:43)
                  ctime 1716417704.983333333 (2024-05-22 15:41:44)
                  mtime 1716417704.983333333 (2024-05-22 15:41:44)
                  otime 17592186044416.000000000 (559444-03-08 01:40:16)
          item 1 key (450 INODE_REF 256) itemoff 16110 itemsize 13
                  index 195 namelen 3 name: 193
          item 2 key (450 XATTR_ITEM 1640047104) itemoff 16073 itemsize 37
                  location key (0 UNKNOWN.0 0) type XATTR
                  transid 7 data_len 1 name_len 6
                  name: user.a
                  data a
          item 3 key (450 EXTENT_DATA 0) itemoff 16020 itemsize 53
                  generation 9 type 1 (regular)
                  extent data disk byte 303144960 nr 12288
                  extent data offset 0 nr 4096 ram 12288
                  extent compression 0 (none)
          item 4 key (450 EXTENT_DATA 4096) itemoff 15967 itemsize 53
                  generation 9 type 2 (prealloc)
                  prealloc data disk byte 303144960 nr 12288
                  prealloc data offset 4096 nr 8192
          item 5 key (450 EXTENT_DATA 8192) itemoff 15914 itemsize 53
                  generation 9 type 2 (prealloc)
                  prealloc data disk byte 303144960 nr 12288
                  prealloc data offset 8192 nr 4096
  ...

So the real problem happened earlier: notice that items 4 (4k-12k) and 5
(8k-12k) overlap. Both are prealloc extents. Item 4 straddles i_size and
item 5 starts at i_size.

Here is the state of 
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-37354</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-37354.html</URL>
        <Description>CVE-2024-37354</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227101</URL>
        <Description>SUSE Bug 1227101</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="192">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nfc: nci: Fix uninit-value in nci_rx_work

syzbot reported the following uninit-value access issue [1]

nci_rx_work() parses received packet from ndev-&gt;rx_q. It should be
validated header size, payload size and total packet size before
processing the packet. If an invalid packet is detected, it should be
silently discarded.</Note>
    </Notes>
    <CVE>CVE-2024-38381</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38381.html</URL>
        <Description>CVE-2024-38381</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226878</URL>
        <Description>SUSE Bug 1226878</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="193">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup

Use the control private_free callback to free the associated data
block. This ensures that the memory won't leak, whatever way the
control gets destroyed.

The original implementation didn't actually remove the ALSA
controls in hda_cs_dsp_control_remove(). It only freed the internal
tracking structure. This meant it was possible to remove/unload the
amp driver while leaving its ALSA controls still present in the
soundcard. Obviously attempting to access them could cause segfaults
or at least dereferencing stale pointers.</Note>
    </Notes>
    <CVE>CVE-2024-38388</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38388.html</URL>
        <Description>CVE-2024-38388</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226890</URL>
        <Description>SUSE Bug 1226890</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="194">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/msm/a6xx: Avoid a nullptr dereference when speedbin setting fails

Calling a6xx_destroy() before adreno_gpu_init() leads to a null pointer
dereference on:

msm_gpu_cleanup() : platform_set_drvdata(gpu-&gt;pdev, NULL);

as gpu-&gt;pdev is only assigned in:

a6xx_gpu_init()
|_ adreno_gpu_init
    |_ msm_gpu_init()

Instead of relying on handwavy null checks down the cleanup chain,
explicitly de-allocate the LLC data and free a6xx_gpu instead.

Patchwork: https://patchwork.freedesktop.org/patch/588919/</Note>
    </Notes>
    <CVE>CVE-2024-38390</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38390.html</URL>
        <Description>CVE-2024-38390</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226891</URL>
        <Description>SUSE Bug 1226891</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="195">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq

Undefined behavior is triggered when bnxt_qplib_alloc_init_hwq is called
with hwq_attr-&gt;aux_depth != 0 and hwq_attr-&gt;aux_stride == 0.
In that case, "roundup_pow_of_two(hwq_attr-&gt;aux_stride)" gets called.
roundup_pow_of_two is documented as undefined for 0.

Fix it in the one caller that had this combination.

The undefined behavior was detected by UBSAN:
  UBSAN: shift-out-of-bounds in ./include/linux/log2.h:57:13
  shift exponent 64 is too large for 64-bit type 'long unsigned int'
  CPU: 24 PID: 1075 Comm: (udev-worker) Not tainted 6.9.0-rc6+ #4
  Hardware name: Abacus electric, s.r.o. - servis@abacus.cz Super Server/H12SSW-iN, BIOS 2.7 10/25/2023
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x5d/0x80
   ubsan_epilogue+0x5/0x30
   __ubsan_handle_shift_out_of_bounds.cold+0x61/0xec
   __roundup_pow_of_two+0x25/0x35 [bnxt_re]
   bnxt_qplib_alloc_init_hwq+0xa1/0x470 [bnxt_re]
   bnxt_qplib_create_qp+0x19e/0x840 [bnxt_re]
   bnxt_re_create_qp+0x9b1/0xcd0 [bnxt_re]
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? __kmalloc+0x1b6/0x4f0
   ? create_qp.part.0+0x128/0x1c0 [ib_core]
   ? __pfx_bnxt_re_create_qp+0x10/0x10 [bnxt_re]
   create_qp.part.0+0x128/0x1c0 [ib_core]
   ib_create_qp_kernel+0x50/0xd0 [ib_core]
   create_mad_qp+0x8e/0xe0 [ib_core]
   ? __pfx_qp_event_handler+0x10/0x10 [ib_core]
   ib_mad_init_device+0x2be/0x680 [ib_core]
   add_client_context+0x10d/0x1a0 [ib_core]
   enable_device_and_get+0xe0/0x1d0 [ib_core]
   ib_register_device+0x53c/0x630 [ib_core]
   ? srso_alias_return_thunk+0x5/0xfbef5
   bnxt_re_probe+0xbd8/0xe50 [bnxt_re]
   ? __pfx_bnxt_re_probe+0x10/0x10 [bnxt_re]
   auxiliary_bus_probe+0x49/0x80
   ? driver_sysfs_add+0x57/0xc0
   really_probe+0xde/0x340
   ? pm_runtime_barrier+0x54/0x90
   ? __pfx___driver_attach+0x10/0x10
   __driver_probe_device+0x78/0x110
   driver_probe_device+0x1f/0xa0
   __driver_attach+0xba/0x1c0
   bus_for_each_dev+0x8f/0xe0
   bus_add_driver+0x146/0x220
   driver_register+0x72/0xd0
   __auxiliary_driver_register+0x6e/0xd0
   ? __pfx_bnxt_re_mod_init+0x10/0x10 [bnxt_re]
   bnxt_re_mod_init+0x3e/0xff0 [bnxt_re]
   ? __pfx_bnxt_re_mod_init+0x10/0x10 [bnxt_re]
   do_one_initcall+0x5b/0x310
   do_init_module+0x90/0x250
   init_module_from_file+0x86/0xc0
   idempotent_init_module+0x121/0x2b0
   __x64_sys_finit_module+0x5e/0xb0
   do_syscall_64+0x82/0x160
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? syscall_exit_to_user_mode_prepare+0x149/0x170
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? syscall_exit_to_user_mode+0x75/0x230
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? do_syscall_64+0x8e/0x160
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? __count_memcg_events+0x69/0x100
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? count_memcg_events.constprop.0+0x1a/0x30
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? handle_mm_fault+0x1f0/0x300
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? do_user_addr_fault+0x34e/0x640
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? srso_alias_return_thunk+0x5/0xfbef5
   entry_SYSCALL_64_after_hwframe+0x76/0x7e
  RIP: 0033:0x7f4e5132821d
  Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d e3 db 0c 00 f7 d8 64 89 01 48
  RSP: 002b:00007ffca9c906a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000139
  RAX: ffffffffffffffda RBX: 0000563ec8a8f130 RCX: 00007f4e5132821d
  RDX: 0000000000000000 RSI: 00007f4e518fa07d RDI: 000000000000003b
  RBP: 00007ffca9c90760 R08: 00007f4e513f6b20 R09: 00007ffca9c906f0
  R10: 0000563ec8a8faa0 R11: 0000000000000246 R12: 00007f4e518fa07d
  R13: 0000000000020000 R14: 0000563ec8409e90 R15: 0000563ec8a8fa60
   &lt;/TASK&gt;
  ---[ end trace ]---</Note>
    </Notes>
    <CVE>CVE-2024-38540</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38540.html</URL>
        <Description>CVE-2024-38540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226582</URL>
        <Description>SUSE Bug 1226582</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="196">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

of: module: add buffer overflow check in of_modalias()

In of_modalias(), if the buffer happens to be too small even for the 1st
snprintf() call, the len parameter will become negative and str parameter
(if not NULL initially) will point beyond the buffer's end. Add the buffer
overflow check after the 1st snprintf() call and fix such check after the
strlen() call (accounting for the terminating NUL char).</Note>
    </Notes>
    <CVE>CVE-2024-38541</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38541.html</URL>
        <Description>CVE-2024-38541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226587</URL>
        <Description>SUSE Bug 1226587</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227496</URL>
        <Description>SUSE Bug 1227496</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="197">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt

In rxe_comp_queue_pkt() an incoming response packet skb is enqueued to the
resp_pkts queue and then a decision is made whether to run the completer
task inline or schedule it. Finally the skb is dereferenced to bump a 'hw'
performance counter. This is wrong because if the completer task is
already running in a separate thread it may have already processed the skb
and freed it which can cause a seg fault.  This has been observed
infrequently in testing at high scale.

This patch fixes this by changing the order of enqueuing the packet until
after the counter is accessed.</Note>
    </Notes>
    <CVE>CVE-2024-38544</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38544.html</URL>
        <Description>CVE-2024-38544</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226597</URL>
        <Description>SUSE Bug 1226597</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="198">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/hns: Fix UAF for cq async event

The refcount of CQ is not protected by locks. When CQ asynchronous
events and CQ destruction are concurrent, CQ may have been released,
which will cause UAF.

Use the xa_lock() to protect the CQ refcount.</Note>
    </Notes>
    <CVE>CVE-2024-38545</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38545.html</URL>
        <Description>CVE-2024-38545</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226595</URL>
        <Description>SUSE Bug 1226595</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="199">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm: vc4: Fix possible null pointer dereference

In vc4_hdmi_audio_init() of_get_address() may return
NULL which is later dereferenced. Fix this bug by adding NULL check.

Found by Linux Verification Center (linuxtesting.org) with SVACE.</Note>
    </Notes>
    <CVE>CVE-2024-38546</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38546.html</URL>
        <Description>CVE-2024-38546</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226593</URL>
        <Description>SUSE Bug 1226593</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="200">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries

The allocation failure of mycs-&gt;yuv_scaler_binary in load_video_binaries()
is followed with a dereference of mycs-&gt;yuv_scaler_binary after the
following call chain:

sh_css_pipe_load_binaries()
  |-&gt; load_video_binaries(mycs-&gt;yuv_scaler_binary == NULL)
  |
  |-&gt; sh_css_pipe_unload_binaries()
        |-&gt; unload_video_binaries()

In unload_video_binaries(), it calls to ia_css_binary_unload with argument
&amp;pipe-&gt;pipe_settings.video.yuv_scaler_binary[i], which refers to the
same memory slot as mycs-&gt;yuv_scaler_binary. Thus, a null-pointer
dereference is triggered.</Note>
    </Notes>
    <CVE>CVE-2024-38547</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38547.html</URL>
        <Description>CVE-2024-38547</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226632</URL>
        <Description>SUSE Bug 1226632</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="201">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference

In cdns_mhdp_atomic_enable(), the return value of drm_mode_duplicate() is
assigned to mhdp_state-&gt;current_mode, and there is a dereference of it in
drm_mode_set_name(), which will lead to a NULL pointer dereference on
failure of drm_mode_duplicate().

Fix this bug add a check of mhdp_state-&gt;current_mode.</Note>
    </Notes>
    <CVE>CVE-2024-38548</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38548.html</URL>
        <Description>CVE-2024-38548</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228202</URL>
        <Description>SUSE Bug 1228202</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="202">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/mediatek: Add 0 size check to mtk_drm_gem_obj

Add a check to mtk_drm_gem_init if we attempt to allocate a GEM object
of 0 bytes. Currently, no such check exists and the kernel will panic if
a userspace application attempts to allocate a 0x0 GBM buffer.

Tested by attempting to allocate a 0x0 GBM buffer on an MT8188 and
verifying that we now return EINVAL.</Note>
    </Notes>
    <CVE>CVE-2024-38549</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38549.html</URL>
        <Description>CVE-2024-38549</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226735</URL>
        <Description>SUSE Bug 1226735</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="203">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ASoC: kirkwood: Fix potential NULL dereference

In kirkwood_dma_hw_params() mv_mbus_dram_info() returns NULL if
CONFIG_PLAT_ORION macro is not defined.
Fix this bug by adding NULL check.

Found by Linux Verification Center (linuxtesting.org) with SVACE.</Note>
    </Notes>
    <CVE>CVE-2024-38550</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38550.html</URL>
        <Description>CVE-2024-38550</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226633</URL>
        <Description>SUSE Bug 1226633</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="204">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix potential index out of bounds in color transformation function

Fixes index out of bounds issue in the color transformation function.
The issue could occur when the index 'i' exceeds the number of transfer
function points (TRANSFER_FUNC_POINTS).

The fix adds a check to ensure 'i' is within bounds before accessing the
transfer function points. If 'i' is out of bounds, an error message is
logged and the function returns false to indicate an error.

Reported by smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:405 cm_helper_translate_curve_to_hw_format() error: buffer overflow 'output_tf-&gt;tf_pts.red' 1025 &lt;= s32max
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:406 cm_helper_translate_curve_to_hw_format() error: buffer overflow 'output_tf-&gt;tf_pts.green' 1025 &lt;= s32max
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:407 cm_helper_translate_curve_to_hw_format() error: buffer overflow 'output_tf-&gt;tf_pts.blue' 1025 &lt;= s32max</Note>
    </Notes>
    <CVE>CVE-2024-38552</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38552.html</URL>
        <Description>CVE-2024-38552</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226767</URL>
        <Description>SUSE Bug 1226767</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="205">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: fec: remove .ndo_poll_controller to avoid deadlocks

There is a deadlock issue found in sungem driver, please refer to the
commit ac0a230f719b ("eth: sungem: remove .ndo_poll_controller to avoid
deadlocks"). The root cause of the issue is that netpoll is in atomic
context and disable_irq() is called by .ndo_poll_controller interface
of sungem driver, however, disable_irq() might sleep. After analyzing
the implementation of fec_poll_controller(), the fec driver should have
the same issue. Due to the fec driver uses NAPI for TX completions, the
.ndo_poll_controller is unnecessary to be implemented in the fec driver,
so fec_poll_controller() can be safely removed.</Note>
    </Notes>
    <CVE>CVE-2024-38553</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38553.html</URL>
        <Description>CVE-2024-38553</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226744</URL>
        <Description>SUSE Bug 1226744</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="206">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Discard command completions in internal error

Fix use after free when FW completion arrives while device is in
internal error state. Avoid calling completion handler in this case,
since the device will flush the command interface and trigger all
completions manually.

Kernel log:
------------[ cut here ]------------
refcount_t: underflow; use-after-free.
...
RIP: 0010:refcount_warn_saturate+0xd8/0xe0
...
Call Trace:
&lt;IRQ&gt;
? __warn+0x79/0x120
? refcount_warn_saturate+0xd8/0xe0
? report_bug+0x17c/0x190
? handle_bug+0x3c/0x60
? exc_invalid_op+0x14/0x70
? asm_exc_invalid_op+0x16/0x20
? refcount_warn_saturate+0xd8/0xe0
cmd_ent_put+0x13b/0x160 [mlx5_core]
mlx5_cmd_comp_handler+0x5f9/0x670 [mlx5_core]
cmd_comp_notifier+0x1f/0x30 [mlx5_core]
notifier_call_chain+0x35/0xb0
atomic_notifier_call_chain+0x16/0x20
mlx5_eq_async_int+0xf6/0x290 [mlx5_core]
notifier_call_chain+0x35/0xb0
atomic_notifier_call_chain+0x16/0x20
irq_int_handler+0x19/0x30 [mlx5_core]
__handle_irq_event_percpu+0x4b/0x160
handle_irq_event+0x2e/0x80
handle_edge_irq+0x98/0x230
__common_interrupt+0x3b/0xa0
common_interrupt+0x7b/0xa0
&lt;/IRQ&gt;
&lt;TASK&gt;
asm_common_interrupt+0x22/0x40</Note>
    </Notes>
    <CVE>CVE-2024-38555</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38555.html</URL>
        <Description>CVE-2024-38555</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226607</URL>
        <Description>SUSE Bug 1226607</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="207">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Add a timeout to acquire the command queue semaphore

Prevent forced completion handling on an entry that has not yet been
assigned an index, causing an out of bounds access on idx = -22.
Instead of waiting indefinitely for the sem, blocking flow now waits for
index to be allocated or a sem acquisition timeout before beginning the
timer for FW completion.

Kernel log example:
mlx5_core 0000:06:00.0: wait_func_handle_exec_timeout:1128:(pid 185911): cmd[-22]: CREATE_UCTX(0xa04) No done completion</Note>
    </Notes>
    <CVE>CVE-2024-38556</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38556.html</URL>
        <Description>CVE-2024-38556</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226774</URL>
        <Description>SUSE Bug 1226774</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="208">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Reload only IB representors upon lag disable/enable

On lag disable, the bond IB device along with all of its
representors are destroyed, and then the slaves' representors get reloaded.

In case the slave IB representor load fails, the eswitch error flow
unloads all representors, including ethernet representors, where the
netdevs get detached and removed from lag bond. Such flow is inaccurate
as the lag driver is not responsible for loading/unloading ethernet
representors. Furthermore, the flow described above begins by holding
lag lock to prevent bond changes during disable flow. However, when
reaching the ethernet representors detachment from lag, the lag lock is
required again, triggering the following deadlock:

Call trace:
__switch_to+0xf4/0x148
__schedule+0x2c8/0x7d0
schedule+0x50/0xe0
schedule_preempt_disabled+0x18/0x28
__mutex_lock.isra.13+0x2b8/0x570
__mutex_lock_slowpath+0x1c/0x28
mutex_lock+0x4c/0x68
mlx5_lag_remove_netdev+0x3c/0x1a0 [mlx5_core]
mlx5e_uplink_rep_disable+0x70/0xa0 [mlx5_core]
mlx5e_detach_netdev+0x6c/0xb0 [mlx5_core]
mlx5e_netdev_change_profile+0x44/0x138 [mlx5_core]
mlx5e_netdev_attach_nic_profile+0x28/0x38 [mlx5_core]
mlx5e_vport_rep_unload+0x184/0x1b8 [mlx5_core]
mlx5_esw_offloads_rep_load+0xd8/0xe0 [mlx5_core]
mlx5_eswitch_reload_reps+0x74/0xd0 [mlx5_core]
mlx5_disable_lag+0x130/0x138 [mlx5_core]
mlx5_lag_disable_change+0x6c/0x70 [mlx5_core] // hold ldev-&gt;lock
mlx5_devlink_eswitch_mode_set+0xc0/0x410 [mlx5_core]
devlink_nl_cmd_eswitch_set_doit+0xdc/0x180
genl_family_rcv_msg_doit.isra.17+0xe8/0x138
genl_rcv_msg+0xe4/0x220
netlink_rcv_skb+0x44/0x108
genl_rcv+0x40/0x58
netlink_unicast+0x198/0x268
netlink_sendmsg+0x1d4/0x418
sock_sendmsg+0x54/0x60
__sys_sendto+0xf4/0x120
__arm64_sys_sendto+0x30/0x40
el0_svc_common+0x8c/0x120
do_el0_svc+0x30/0xa0
el0_svc+0x20/0x30
el0_sync_handler+0x90/0xb8
el0_sync+0x160/0x180

Thus, upon lag enable/disable, load and unload only the IB representors
of the slaves preventing the deadlock mentioned above.

While at it, refactor the mlx5_esw_offloads_rep_load() function to have
a static helper method for its internal logic, in symmetry with the
representor unload design.</Note>
    </Notes>
    <CVE>CVE-2024-38557</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38557.html</URL>
        <Description>CVE-2024-38557</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226781</URL>
        <Description>SUSE Bug 1226781</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="209">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: qedf: Ensure the copied buf is NUL terminated

Currently, we allocate a count-sized kernel buffer and copy count from
userspace to that buffer. Later, we use kstrtouint on this buffer but we
don't ensure that the string is terminated inside the buffer, this can
lead to OOB read when using kstrtouint. Fix this issue by using
memdup_user_nul instead of memdup_user.</Note>
    </Notes>
    <CVE>CVE-2024-38559</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38559.html</URL>
        <Description>CVE-2024-38559</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226785</URL>
        <Description>SUSE Bug 1226785</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227495</URL>
        <Description>SUSE Bug 1227495</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="210">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: bfa: Ensure the copied buf is NUL terminated

Currently, we allocate a nbytes-sized kernel buffer and copy nbytes from
userspace to that buffer. Later, we use sscanf on this buffer but we don't
ensure that the string is terminated inside the buffer, this can lead to
OOB read when using sscanf. Fix this issue by using memdup_user_nul instead
of memdup_user.</Note>
    </Notes>
    <CVE>CVE-2024-38560</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38560.html</URL>
        <Description>CVE-2024-38560</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226786</URL>
        <Description>SUSE Bug 1226786</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227319</URL>
        <Description>SUSE Bug 1227319</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="211">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE

bpf_prog_attach uses attach_type_to_prog_type to enforce proper
attach type for BPF_PROG_TYPE_CGROUP_SKB. link_create uses
bpf_prog_get and relies on bpf_prog_attach_check_attach_type
to properly verify prog_type &lt;&gt; attach_type association.

Add missing attach_type enforcement for the link_create case.
Otherwise, it's currently possible to attach cgroup_skb prog
types to other cgroup hooks.</Note>
    </Notes>
    <CVE>CVE-2024-38564</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38564.html</URL>
        <Description>CVE-2024-38564</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226789</URL>
        <Description>SUSE Bug 1226789</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228730</URL>
        <Description>SUSE Bug 1228730</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="212">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: ar5523: enable proper endpoint verification

Syzkaller reports [1] hitting a warning about an endpoint in use
not having an expected type to it.

Fix the issue by checking for the existence of all proper
endpoints with their according types intact.

Sadly, this patch has not been tested on real hardware.

[1] Syzkaller report:
------------[ cut here ]------------
usb 1-1: BOGUS urb xfer, pipe 3 != type 1
WARNING: CPU: 0 PID: 3643 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504
...
Call Trace:
 &lt;TASK&gt;
 ar5523_cmd+0x41b/0x780 drivers/net/wireless/ath/ar5523/ar5523.c:275
 ar5523_cmd_read drivers/net/wireless/ath/ar5523/ar5523.c:302 [inline]
 ar5523_host_available drivers/net/wireless/ath/ar5523/ar5523.c:1376 [inline]
 ar5523_probe+0x14b0/0x1d10 drivers/net/wireless/ath/ar5523/ar5523.c:1655
 usb_probe_interface+0x30f/0x7f0 drivers/usb/core/driver.c:396
 call_driver_probe drivers/base/dd.c:560 [inline]
 really_probe+0x249/0xb90 drivers/base/dd.c:639
 __driver_probe_device+0x1df/0x4d0 drivers/base/dd.c:778
 driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:808
 __device_attach_driver+0x1d4/0x2e0 drivers/base/dd.c:936
 bus_for_each_drv+0x163/0x1e0 drivers/base/bus.c:427
 __device_attach+0x1e4/0x530 drivers/base/dd.c:1008
 bus_probe_device+0x1e8/0x2a0 drivers/base/bus.c:487
 device_add+0xbd9/0x1e90 drivers/base/core.c:3517
 usb_set_configuration+0x101d/0x1900 drivers/usb/core/message.c:2170
 usb_generic_driver_probe+0xbe/0x100 drivers/usb/core/generic.c:238
 usb_probe_device+0xd8/0x2c0 drivers/usb/core/driver.c:293
 call_driver_probe drivers/base/dd.c:560 [inline]
 really_probe+0x249/0xb90 drivers/base/dd.c:639
 __driver_probe_device+0x1df/0x4d0 drivers/base/dd.c:778
 driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:808
 __device_attach_driver+0x1d4/0x2e0 drivers/base/dd.c:936
 bus_for_each_drv+0x163/0x1e0 drivers/base/bus.c:427
 __device_attach+0x1e4/0x530 drivers/base/dd.c:1008
 bus_probe_device+0x1e8/0x2a0 drivers/base/bus.c:487
 device_add+0xbd9/0x1e90 drivers/base/core.c:3517
 usb_new_device.cold+0x685/0x10ad drivers/usb/core/hub.c:2573
 hub_port_connect drivers/usb/core/hub.c:5353 [inline]
 hub_port_connect_change drivers/usb/core/hub.c:5497 [inline]
 port_event drivers/usb/core/hub.c:5653 [inline]
 hub_event+0x26cb/0x45d0 drivers/usb/core/hub.c:5735
 process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289
 worker_thread+0x669/0x1090 kernel/workqueue.c:2436
 kthread+0x2e8/0x3a0 kernel/kthread.c:376
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306
 &lt;/TASK&gt;</Note>
    </Notes>
    <CVE>CVE-2024-38565</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38565.html</URL>
        <Description>CVE-2024-38565</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226747</URL>
        <Description>SUSE Bug 1226747</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="213">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: carl9170: add a proper sanity check for endpoints

Syzkaller reports [1] hitting a warning which is caused by presence
of a wrong endpoint type at the URB sumbitting stage. While there
was a check for a specific 4th endpoint, since it can switch types
between bulk and interrupt, other endpoints are trusted implicitly.
Similar warning is triggered in a couple of other syzbot issues [2].

Fix the issue by doing a comprehensive check of all endpoints
taking into account difference between high- and full-speed
configuration.

[1] Syzkaller report:
...
WARNING: CPU: 0 PID: 4721 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504
...
Call Trace:
 &lt;TASK&gt;
 carl9170_usb_send_rx_irq_urb+0x273/0x340 drivers/net/wireless/ath/carl9170/usb.c:504
 carl9170_usb_init_device drivers/net/wireless/ath/carl9170/usb.c:939 [inline]
 carl9170_usb_firmware_finish drivers/net/wireless/ath/carl9170/usb.c:999 [inline]
 carl9170_usb_firmware_step2+0x175/0x240 drivers/net/wireless/ath/carl9170/usb.c:1028
 request_firmware_work_func+0x130/0x240 drivers/base/firmware_loader/main.c:1107
 process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289
 worker_thread+0x669/0x1090 kernel/workqueue.c:2436
 kthread+0x2e8/0x3a0 kernel/kthread.c:376
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308
 &lt;/TASK&gt;

[2] Related syzkaller crashes:</Note>
    </Notes>
    <CVE>CVE-2024-38567</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38567.html</URL>
        <Description>CVE-2024-38567</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226769</URL>
        <Description>SUSE Bug 1226769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="214">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drivers/perf: hisi: hns3: Fix out-of-bound access when valid event group

The perf tool allows users to create event groups through following
cmd [1], but the driver does not check whether the array index is out
of bounds when writing data to the event_group array. If the number of
events in an event_group is greater than HNS3_PMU_MAX_HW_EVENTS, the
memory write overflow of event_group array occurs.

Add array index check to fix the possible array out of bounds violation,
and return directly when write new events are written to array bounds.

There are 9 different events in an event_group.
[1] perf stat -e '{pmu/event1/, ... ,pmu/event9/}</Note>
    </Notes>
    <CVE>CVE-2024-38568</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38568.html</URL>
        <Description>CVE-2024-38568</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226771</URL>
        <Description>SUSE Bug 1226771</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="215">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

thermal/drivers/tsens: Fix null pointer dereference

compute_intercept_slope() is called from calibrate_8960() (in tsens-8960.c)
as compute_intercept_slope(priv, p1, NULL, ONE_PT_CALIB) which lead to null
pointer dereference (if DEBUG or DYNAMIC_DEBUG set).
Fix this bug by adding null pointer check.

Found by Linux Verification Center (linuxtesting.org) with SVACE.</Note>
    </Notes>
    <CVE>CVE-2024-38571</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38571.html</URL>
        <Description>CVE-2024-38571</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226737</URL>
        <Description>SUSE Bug 1226737</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="216">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

cppc_cpufreq: Fix possible null pointer dereference

cppc_cpufreq_get_rate() and hisi_cppc_cpufreq_get_rate() can be called from
different places with various parameters. So cpufreq_cpu_get() can return
null as 'policy' in some circumstances.
Fix this bug by adding null return check.

Found by Linux Verification Center (linuxtesting.org) with SVACE.</Note>
    </Notes>
    <CVE>CVE-2024-38573</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38573.html</URL>
        <Description>CVE-2024-38573</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226739</URL>
        <Description>SUSE Bug 1226739</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="217">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ecryptfs: Fix buffer size for tag 66 packet

The 'TAG 66 Packet Format' description is missing the cipher code and
checksum fields that are packed into the message packet. As a result,
the buffer allocated for the packet is 3 bytes too small and
write_tag_66_packet() will write up to 3 bytes past the end of the
buffer.

Fix this by increasing the size of the allocation so the whole packet
will always fit in the buffer.

This fixes the below kasan slab-out-of-bounds bug:

  BUG: KASAN: slab-out-of-bounds in ecryptfs_generate_key_packet_set+0x7d6/0xde0
  Write of size 1 at addr ffff88800afbb2a5 by task touch/181

  CPU: 0 PID: 181 Comm: touch Not tainted 6.6.13-gnu #1 4c9534092be820851bb687b82d1f92a426598dc6
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2/GNU Guix 04/01/2014
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x4c/0x70
   print_report+0xc5/0x610
   ? ecryptfs_generate_key_packet_set+0x7d6/0xde0
   ? kasan_complete_mode_report_info+0x44/0x210
   ? ecryptfs_generate_key_packet_set+0x7d6/0xde0
   kasan_report+0xc2/0x110
   ? ecryptfs_generate_key_packet_set+0x7d6/0xde0
   __asan_store1+0x62/0x80
   ecryptfs_generate_key_packet_set+0x7d6/0xde0
   ? __pfx_ecryptfs_generate_key_packet_set+0x10/0x10
   ? __alloc_pages+0x2e2/0x540
   ? __pfx_ovl_open+0x10/0x10 [overlay 30837f11141636a8e1793533a02e6e2e885dad1d]
   ? dentry_open+0x8f/0xd0
   ecryptfs_write_metadata+0x30a/0x550
   ? __pfx_ecryptfs_write_metadata+0x10/0x10
   ? ecryptfs_get_lower_file+0x6b/0x190
   ecryptfs_initialize_file+0x77/0x150
   ecryptfs_create+0x1c2/0x2f0
   path_openat+0x17cf/0x1ba0
   ? __pfx_path_openat+0x10/0x10
   do_filp_open+0x15e/0x290
   ? __pfx_do_filp_open+0x10/0x10
   ? __kasan_check_write+0x18/0x30
   ? _raw_spin_lock+0x86/0xf0
   ? __pfx__raw_spin_lock+0x10/0x10
   ? __kasan_check_write+0x18/0x30
   ? alloc_fd+0xf4/0x330
   do_sys_openat2+0x122/0x160
   ? __pfx_do_sys_openat2+0x10/0x10
   __x64_sys_openat+0xef/0x170
   ? __pfx___x64_sys_openat+0x10/0x10
   do_syscall_64+0x60/0xd0
   entry_SYSCALL_64_after_hwframe+0x6e/0xd8
  RIP: 0033:0x7f00a703fd67
  Code: 25 00 00 41 00 3d 00 00 41 00 74 37 64 8b 04 25 18 00 00 00 85 c0 75 5b 44 89 e2 48 89 ee bf 9c ff ff ff b8 01 01 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 0f 87 85 00 00 00 48 83 c4 68 5d 41 5c c3 0f 1f
  RSP: 002b:00007ffc088e30b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
  RAX: ffffffffffffffda RBX: 00007ffc088e3368 RCX: 00007f00a703fd67
  RDX: 0000000000000941 RSI: 00007ffc088e48d7 RDI: 00000000ffffff9c
  RBP: 00007ffc088e48d7 R08: 0000000000000001 R09: 0000000000000000
  R10: 00000000000001b6 R11: 0000000000000246 R12: 0000000000000941
  R13: 0000000000000000 R14: 00007ffc088e48d7 R15: 00007f00a7180040
   &lt;/TASK&gt;

  Allocated by task 181:
   kasan_save_stack+0x2f/0x60
   kasan_set_track+0x29/0x40
   kasan_save_alloc_info+0x25/0x40
   __kasan_kmalloc+0xc5/0xd0
   __kmalloc+0x66/0x160
   ecryptfs_generate_key_packet_set+0x6d2/0xde0
   ecryptfs_write_metadata+0x30a/0x550
   ecryptfs_initialize_file+0x77/0x150
   ecryptfs_create+0x1c2/0x2f0
   path_openat+0x17cf/0x1ba0
   do_filp_open+0x15e/0x290
   do_sys_openat2+0x122/0x160
   __x64_sys_openat+0xef/0x170
   do_syscall_64+0x60/0xd0
   entry_SYSCALL_64_after_hwframe+0x6e/0xd8</Note>
    </Notes>
    <CVE>CVE-2024-38578</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38578.html</URL>
        <Description>CVE-2024-38578</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226634</URL>
        <Description>SUSE Bug 1226634</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="218">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

crypto: bcm - Fix pointer arithmetic

In spu2_dump_omd() value of ptr is increased by ciph_key_len
instead of hash_iv_len which could lead to going beyond the
buffer boundaries.
Fix this bug by changing ciph_key_len to hash_iv_len.

Found by Linux Verification Center (linuxtesting.org) with SVACE.</Note>
    </Notes>
    <CVE>CVE-2024-38579</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38579.html</URL>
        <Description>CVE-2024-38579</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226637</URL>
        <Description>SUSE Bug 1226637</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="219">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

epoll: be better about file lifetimes

epoll can call out to vfs_poll() with a file pointer that may race with
the last 'fput()'. That would make f_count go down to zero, and while
the ep-&gt;mtx locking means that the resulting file pointer tear-down will
be blocked until the poll returns, it means that f_count is already
dead, and any use of it won't actually get a reference to the file any
more: it's dead regardless.

Make sure we have a valid ref on the file pointer before we call down to
vfs_poll() from the epoll routines.</Note>
    </Notes>
    <CVE>CVE-2024-38580</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38580.html</URL>
        <Description>CVE-2024-38580</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226610</URL>
        <Description>SUSE Bug 1226610</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="220">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu/mes: fix use-after-free issue

Delete fence fallback timer to fix the ramdom
use-after-free issue.

v2: move to amdgpu_mes.c</Note>
    </Notes>
    <CVE>CVE-2024-38581</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38581.html</URL>
        <Description>CVE-2024-38581</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226657</URL>
        <Description>SUSE Bug 1226657</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="221">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix potential hang in nilfs_detach_log_writer()

Syzbot has reported a potential hang in nilfs_detach_log_writer() called
during nilfs2 unmount.

Analysis revealed that this is because nilfs_segctor_sync(), which
synchronizes with the log writer thread, can be called after
nilfs_segctor_destroy() terminates that thread, as shown in the call trace
below:

nilfs_detach_log_writer
  nilfs_segctor_destroy
    nilfs_segctor_kill_thread  --&gt; Shut down log writer thread
    flush_work
      nilfs_iput_work_func
        nilfs_dispose_list
          iput
            nilfs_evict_inode
              nilfs_transaction_commit
                nilfs_construct_segment (if inode needs sync)
                  nilfs_segctor_sync  --&gt; Attempt to synchronize with
                                          log writer thread
                           *** DEADLOCK ***

Fix this issue by changing nilfs_segctor_sync() so that the log writer
thread returns normally without synchronizing after it terminates, and by
forcing tasks that are already waiting to complete once after the thread
terminates.

The skipped inode metadata flushout will then be processed together in the
subsequent cleanup work in nilfs_segctor_destroy().</Note>
    </Notes>
    <CVE>CVE-2024-38582</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38582.html</URL>
        <Description>CVE-2024-38582</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226658</URL>
        <Description>SUSE Bug 1226658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="222">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix use-after-free of timer for log writer thread

Patch series "nilfs2: fix log writer related issues".

This bug fix series covers three nilfs2 log writer-related issues,
including a timer use-after-free issue and potential deadlock issue on
unmount, and a potential freeze issue in event synchronization found
during their analysis.  Details are described in each commit log.


This patch (of 3):

A use-after-free issue has been reported regarding the timer sc_timer on
the nilfs_sc_info structure.

The problem is that even though it is used to wake up a sleeping log
writer thread, sc_timer is not shut down until the nilfs_sc_info structure
is about to be freed, and is used regardless of the thread's lifetime.

Fix this issue by limiting the use of sc_timer only while the log writer
thread is alive.</Note>
    </Notes>
    <CVE>CVE-2024-38583</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38583.html</URL>
        <Description>CVE-2024-38583</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226777</URL>
        <Description>SUSE Bug 1226777</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227286</URL>
        <Description>SUSE Bug 1227286</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="223">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

speakup: Fix sizeof() vs ARRAY_SIZE() bug

The "buf" pointer is an array of u16 values.  This code should be
using ARRAY_SIZE() (which is 256) instead of sizeof() (which is 512),
otherwise it can the still got out of bounds.</Note>
    </Notes>
    <CVE>CVE-2024-38587</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38587.html</URL>
        <Description>CVE-2024-38587</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226780</URL>
        <Description>SUSE Bug 1226780</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="224">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/hns: Modify the print level of CQE error

Too much print may lead to a panic in kernel. Change ibdev_err() to
ibdev_err_ratelimited(), and change the printing level of cqe dump
to debug level.</Note>
    </Notes>
    <CVE>CVE-2024-38590</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38590.html</URL>
        <Description>CVE-2024-38590</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226839</URL>
        <Description>SUSE Bug 1226839</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="225">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/hns: Fix deadlock on SRQ async events.

xa_lock for SRQ table may be required in AEQ. Use xa_store_irq()/
xa_erase_irq() to avoid deadlock.</Note>
    </Notes>
    <CVE>CVE-2024-38591</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38591.html</URL>
        <Description>CVE-2024-38591</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226738</URL>
        <Description>SUSE Bug 1226738</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="226">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: move the EST lock to struct stmmac_priv

Reinitialize the whole EST structure would also reset the mutex
lock which is embedded in the EST structure, and then trigger
the following warning. To address this, move the lock to struct
stmmac_priv. We also need to reacquire the mutex lock when doing
this initialization.

DEBUG_LOCKS_WARN_ON(lock-&gt;magic != lock)
WARNING: CPU: 3 PID: 505 at kernel/locking/mutex.c:587 __mutex_lock+0xd84/0x1068
 Modules linked in:
 CPU: 3 PID: 505 Comm: tc Not tainted 6.9.0-rc6-00053-g0106679839f7-dirty #29
 Hardware name: NXP i.MX8MPlus EVK board (DT)
 pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : __mutex_lock+0xd84/0x1068
 lr : __mutex_lock+0xd84/0x1068
 sp : ffffffc0864e3570
 x29: ffffffc0864e3570 x28: ffffffc0817bdc78 x27: 0000000000000003
 x26: ffffff80c54f1808 x25: ffffff80c9164080 x24: ffffffc080d723ac
 x23: 0000000000000000 x22: 0000000000000002 x21: 0000000000000000
 x20: 0000000000000000 x19: ffffffc083bc3000 x18: ffffffffffffffff
 x17: ffffffc08117b080 x16: 0000000000000002 x15: ffffff80d2d40000
 x14: 00000000000002da x13: ffffff80d2d404b8 x12: ffffffc082b5a5c8
 x11: ffffffc082bca680 x10: ffffffc082bb2640 x9 : ffffffc082bb2698
 x8 : 0000000000017fe8 x7 : c0000000ffffefff x6 : 0000000000000001
 x5 : ffffff8178fe0d48 x4 : 0000000000000000 x3 : 0000000000000027
 x2 : ffffff8178fe0d50 x1 : 0000000000000000 x0 : 0000000000000000
 Call trace:
  __mutex_lock+0xd84/0x1068
  mutex_lock_nested+0x28/0x34
  tc_setup_taprio+0x118/0x68c
  stmmac_setup_tc+0x50/0xf0
  taprio_change+0x868/0xc9c</Note>
    </Notes>
    <CVE>CVE-2024-38594</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38594.html</URL>
        <Description>CVE-2024-38594</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226734</URL>
        <Description>SUSE Bug 1226734</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="227">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

eth: sungem: remove .ndo_poll_controller to avoid deadlocks

Erhard reports netpoll warnings from sungem:

  netpoll_send_skb_on_dev(): eth0 enabled interrupts in poll (gem_start_xmit+0x0/0x398)
  WARNING: CPU: 1 PID: 1 at net/core/netpoll.c:370 netpoll_send_skb+0x1fc/0x20c

gem_poll_controller() disables interrupts, which may sleep.
We can't sleep in netpoll, it has interrupts disabled completely.
Strangely, gem_poll_controller() doesn't even poll the completions,
and instead acts as if an interrupt has fired so it just schedules
NAPI and exits. None of this has been necessary for years, since
netpoll invokes NAPI directly.</Note>
    </Notes>
    <CVE>CVE-2024-38597</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38597.html</URL>
        <Description>CVE-2024-38597</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226749</URL>
        <Description>SUSE Bug 1226749</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="228">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

jffs2: prevent xattr node from overflowing the eraseblock

Add a check to make sure that the requested xattr node size is no larger
than the eraseblock minus the cleanmarker.

Unlike the usual inode nodes, the xattr nodes aren't split into parts
and spread across multiple eraseblocks, which means that a xattr node
must not occupy more than one eraseblock. If the requested xattr value is
too large, the xattr node can spill onto the next eraseblock, overwriting
the nodes and causing errors such as:

jffs2: argh. node added in wrong place at 0x0000b050(2)
jffs2: nextblock 0x0000a000, expected at 0000b00c
jffs2: error: (823) do_verify_xattr_datum: node CRC failed at 0x01e050,
read=0xfc892c93, calc=0x000000
jffs2: notice: (823) jffs2_get_inode_nodes: Node header CRC failed
at 0x01e00c. {848f,2fc4,0fef511f,59a3d171}
jffs2: Node at 0x0000000c with length 0x00001044 would run over the
end of the erase block
jffs2: Perhaps the file system was created with the wrong erase size?
jffs2: jffs2_scan_eraseblock(): Magic bitmask 0x1985 not found
at 0x00000010: 0x1044 instead

This breaks the filesystem and can lead to KASAN crashes such as:

BUG: KASAN: slab-out-of-bounds in jffs2_sum_add_kvec+0x125e/0x15d0
Read of size 4 at addr ffff88802c31e914 by task repro/830
CPU: 0 PID: 830 Comm: repro Not tainted 6.9.0-rc3+ #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),
BIOS Arch Linux 1.16.3-1-1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0xc6/0x120
 print_report+0xc4/0x620
 ? __virt_addr_valid+0x308/0x5b0
 kasan_report+0xc1/0xf0
 ? jffs2_sum_add_kvec+0x125e/0x15d0
 ? jffs2_sum_add_kvec+0x125e/0x15d0
 jffs2_sum_add_kvec+0x125e/0x15d0
 jffs2_flash_direct_writev+0xa8/0xd0
 jffs2_flash_writev+0x9c9/0xef0
 ? __x64_sys_setxattr+0xc4/0x160
 ? do_syscall_64+0x69/0x140
 ? entry_SYSCALL_64_after_hwframe+0x76/0x7e
 [...]

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.</Note>
    </Notes>
    <CVE>CVE-2024-38599</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38599.html</URL>
        <Description>CVE-2024-38599</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223384</URL>
        <Description>SUSE Bug 1223384</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226848</URL>
        <Description>SUSE Bug 1226848</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227283</URL>
        <Description>SUSE Bug 1227283</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="229">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ALSA: Fix deadlocks with kctl removals at disconnection

In snd_card_disconnect(), we set card-&gt;shutdown flag at the beginning,
call callbacks and do sync for card-&gt;power_ref_sleep waiters at the
end.  The callback may delete a kctl element, and this can lead to a
deadlock when the device was in the suspended state.  Namely:

* A process waits for the power up at snd_power_ref_and_wait() in
  snd_ctl_info() or read/write() inside card-&gt;controls_rwsem.

* The system gets disconnected meanwhile, and the driver tries to
  delete a kctl via snd_ctl_remove*(); it tries to take
  card-&gt;controls_rwsem again, but this is already locked by the
  above.  Since the sleeper isn't woken up, this deadlocks.

An easy fix is to wake up sleepers before processing the driver
disconnect callbacks but right after setting the card-&gt;shutdown flag.
Then all sleepers will abort immediately, and the code flows again.

So, basically this patch moves the wait_event() call at the right
timing.  While we're at it, just to be sure, call wait_event_all()
instead of wait_event(), although we don't use exclusive events on
this queue for now.</Note>
    </Notes>
    <CVE>CVE-2024-38600</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38600.html</URL>
        <Description>CVE-2024-38600</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226864</URL>
        <Description>SUSE Bug 1226864</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="230">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ring-buffer: Fix a race between readers and resize checks

The reader code in rb_get_reader_page() swaps a new reader page into the
ring buffer by doing cmpxchg on old-&gt;list.prev-&gt;next to point it to the
new page. Following that, if the operation is successful,
old-&gt;list.next-&gt;prev gets updated too. This means the underlying
doubly-linked list is temporarily inconsistent, page-&gt;prev-&gt;next or
page-&gt;next-&gt;prev might not be equal back to page for some page in the
ring buffer.

The resize operation in ring_buffer_resize() can be invoked in parallel.
It calls rb_check_pages() which can detect the described inconsistency
and stop further tracing:

[  190.271762] ------------[ cut here ]------------
[  190.271771] WARNING: CPU: 1 PID: 6186 at kernel/trace/ring_buffer.c:1467 rb_check_pages.isra.0+0x6a/0xa0
[  190.271789] Modules linked in: [...]
[  190.271991] Unloaded tainted modules: intel_uncore_frequency(E):1 skx_edac(E):1
[  190.272002] CPU: 1 PID: 6186 Comm: cmd.sh Kdump: loaded Tainted: G            E      6.9.0-rc6-default #5 158d3e1e6d0b091c34c3b96bfd99a1c58306d79f
[  190.272011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.0-0-gd239552c-rebuilt.opensuse.org 04/01/2014
[  190.272015] RIP: 0010:rb_check_pages.isra.0+0x6a/0xa0
[  190.272023] Code: [...]
[  190.272028] RSP: 0018:ffff9c37463abb70 EFLAGS: 00010206
[  190.272034] RAX: ffff8eba04b6cb80 RBX: 0000000000000007 RCX: ffff8eba01f13d80
[  190.272038] RDX: ffff8eba01f130c0 RSI: ffff8eba04b6cd00 RDI: ffff8eba0004c700
[  190.272042] RBP: ffff8eba0004c700 R08: 0000000000010002 R09: 0000000000000000
[  190.272045] R10: 00000000ffff7f52 R11: ffff8eba7f600000 R12: ffff8eba0004c720
[  190.272049] R13: ffff8eba00223a00 R14: 0000000000000008 R15: ffff8eba067a8000
[  190.272053] FS:  00007f1bd64752c0(0000) GS:ffff8eba7f680000(0000) knlGS:0000000000000000
[  190.272057] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  190.272061] CR2: 00007f1bd6662590 CR3: 000000010291e001 CR4: 0000000000370ef0
[  190.272070] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  190.272073] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  190.272077] Call Trace:
[  190.272098]  &lt;TASK&gt;
[  190.272189]  ring_buffer_resize+0x2ab/0x460
[  190.272199]  __tracing_resize_ring_buffer.part.0+0x23/0xa0
[  190.272206]  tracing_resize_ring_buffer+0x65/0x90
[  190.272216]  tracing_entries_write+0x74/0xc0
[  190.272225]  vfs_write+0xf5/0x420
[  190.272248]  ksys_write+0x67/0xe0
[  190.272256]  do_syscall_64+0x82/0x170
[  190.272363]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[  190.272373] RIP: 0033:0x7f1bd657d263
[  190.272381] Code: [...]
[  190.272385] RSP: 002b:00007ffe72b643f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  190.272391] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f1bd657d263
[  190.272395] RDX: 0000000000000002 RSI: 0000555a6eb538e0 RDI: 0000000000000001
[  190.272398] RBP: 0000555a6eb538e0 R08: 000000000000000a R09: 0000000000000000
[  190.272401] R10: 0000555a6eb55190 R11: 0000000000000246 R12: 00007f1bd6662500
[  190.272404] R13: 0000000000000002 R14: 00007f1bd6667c00 R15: 0000000000000002
[  190.272412]  &lt;/TASK&gt;
[  190.272414] ---[ end trace 0000000000000000 ]---

Note that ring_buffer_resize() calls rb_check_pages() only if the parent
trace_buffer has recording disabled. Recent commit d78ab792705c
("tracing: Stop current tracer when resizing buffer") causes that it is
now always the case which makes it more likely to experience this issue.

The window to hit this race is nonetheless very small. To help
reproducing it, one can add a delay loop in rb_get_reader_page():

 ret = rb_head_page_replace(reader, cpu_buffer-&gt;reader_page);
 if (!ret)
 	goto spin;
 for (unsigned i = 0; i &lt; 1U &lt;&lt; 26; i++)  /* inserted delay loop */
 	__asm__ __volatile__ ("" : : : "memory");
 rb_list_head(reader-&gt;list.next)-&gt;prev = &amp;cpu_buffer-&gt;reader_page-&gt;list;

.. 
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-38601</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38601.html</URL>
        <Description>CVE-2024-38601</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226876</URL>
        <Description>SUSE Bug 1226876</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="231">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drivers/perf: hisi: hns3: Actually use devm_add_action_or_reset()

pci_alloc_irq_vectors() allocates an irq vector. When devm_add_action()
fails, the irq vector is not freed, which leads to a memory leak.

Replace the devm_add_action with devm_add_action_or_reset to ensure
the irq vector can be destroyed when it fails.</Note>
    </Notes>
    <CVE>CVE-2024-38603</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38603.html</URL>
        <Description>CVE-2024-38603</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226842</URL>
        <Description>SUSE Bug 1226842</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="232">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ALSA: core: Fix NULL module pointer assignment at card init

The commit 81033c6b584b ("ALSA: core: Warn on empty module")
introduced a WARN_ON() for a NULL module pointer passed at snd_card
object creation, and it also wraps the code around it with '#ifdef
MODULE'.  This works in most cases, but the devils are always in
details.  "MODULE" is defined when the target code (i.e. the sound
core) is built as a module; but this doesn't mean that the caller is
also built-in or not.  Namely, when only the sound core is built-in
(CONFIG_SND=y) while the driver is a module (CONFIG_SND_USB_AUDIO=m),
the passed module pointer is ignored even if it's non-NULL, and
card-&gt;module remains as NULL.  This would result in the missing module
reference up/down at the device open/close, leading to a race with the
code execution after the module removal.

For addressing the bug, move the assignment of card-&gt;module again out
of ifdef.  The WARN_ON() is still wrapped with ifdef because the
module can be really NULL when all sound drivers are built-in.

Note that we keep 'ifdef MODULE' for WARN_ON(), otherwise it would
lead to a false-positive NULL module check.  Admittedly it won't catch
perfectly, i.e. no check is performed when CONFIG_SND=y.  But, it's no
real problem as it's only for debugging, and the condition is pretty
rare.</Note>
    </Notes>
    <CVE>CVE-2024-38605</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38605.html</URL>
        <Description>CVE-2024-38605</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226740</URL>
        <Description>SUSE Bug 1226740</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="233">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix netif state handling

mlx5e_suspend cleans resources only if netif_device_present() returns
true. However, mlx5e_resume changes the state of netif, via
mlx5e_nic_enable, only if reg_state == NETREG_REGISTERED.
In the below case, the above leads to NULL-ptr Oops[1] and memory
leaks:

mlx5e_probe
 _mlx5e_resume
  mlx5e_attach_netdev
   mlx5e_nic_enable  &lt;-- netdev not reg, not calling netif_device_attach()
  register_netdev &lt;-- failed for some reason.
ERROR_FLOW:
 _mlx5e_suspend &lt;-- netif_device_present return false, resources aren't freed :(

Hence, clean resources in this case as well.

[1]
BUG: kernel NULL pointer dereference, address: 0000000000000000
PGD 0 P4D 0
Oops: 0010 [#1] SMP
CPU: 2 PID: 9345 Comm: test-ovs-ct-gen Not tainted 6.5.0_for_upstream_min_debug_2023_09_05_16_01 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
RIP: 0010:0x0
Code: Unable to access opcode bytes at0xffffffffffffffd6.
RSP: 0018:ffff888178aaf758 EFLAGS: 00010246
Call Trace:
 &lt;TASK&gt;
 ? __die+0x20/0x60
 ? page_fault_oops+0x14c/0x3c0
 ? exc_page_fault+0x75/0x140
 ? asm_exc_page_fault+0x22/0x30
 notifier_call_chain+0x35/0xb0
 blocking_notifier_call_chain+0x3d/0x60
 mlx5_blocking_notifier_call_chain+0x22/0x30 [mlx5_core]
 mlx5_core_uplink_netdev_event_replay+0x3e/0x60 [mlx5_core]
 mlx5_mdev_netdev_track+0x53/0x60 [mlx5_ib]
 mlx5_ib_roce_init+0xc3/0x340 [mlx5_ib]
 __mlx5_ib_add+0x34/0xd0 [mlx5_ib]
 mlx5r_probe+0xe1/0x210 [mlx5_ib]
 ? auxiliary_match_id+0x6a/0x90
 auxiliary_bus_probe+0x38/0x80
 ? driver_sysfs_add+0x51/0x80
 really_probe+0xc9/0x3e0
 ? driver_probe_device+0x90/0x90
 __driver_probe_device+0x80/0x160
 driver_probe_device+0x1e/0x90
 __device_attach_driver+0x7d/0x100
 bus_for_each_drv+0x80/0xd0
 __device_attach+0xbc/0x1f0
 bus_probe_device+0x86/0xa0
 device_add+0x637/0x840
 __auxiliary_device_add+0x3b/0xa0
 add_adev+0xc9/0x140 [mlx5_core]
 mlx5_rescan_drivers_locked+0x22a/0x310 [mlx5_core]
 mlx5_register_device+0x53/0xa0 [mlx5_core]
 mlx5_init_one_devl_locked+0x5c4/0x9c0 [mlx5_core]
 mlx5_init_one+0x3b/0x60 [mlx5_core]
 probe_one+0x44c/0x730 [mlx5_core]
 local_pci_probe+0x3e/0x90
 pci_device_probe+0xbf/0x210
 ? kernfs_create_link+0x5d/0xa0
 ? sysfs_do_create_link_sd+0x60/0xc0
 really_probe+0xc9/0x3e0
 ? driver_probe_device+0x90/0x90
 __driver_probe_device+0x80/0x160
 driver_probe_device+0x1e/0x90
 __device_attach_driver+0x7d/0x100
 bus_for_each_drv+0x80/0xd0
 __device_attach+0xbc/0x1f0
 pci_bus_add_device+0x54/0x80
 pci_iov_add_virtfn+0x2e6/0x320
 sriov_enable+0x208/0x420
 mlx5_core_sriov_configure+0x9e/0x200 [mlx5_core]
 sriov_numvfs_store+0xae/0x1a0
 kernfs_fop_write_iter+0x10c/0x1a0
 vfs_write+0x291/0x3c0
 ksys_write+0x5f/0xe0
 do_syscall_64+0x3d/0x90
 entry_SYSCALL_64_after_hwframe+0x46/0xb0
 CR2: 0000000000000000
 ---[ end trace 0000000000000000  ]---</Note>
    </Notes>
    <CVE>CVE-2024-38608</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38608.html</URL>
        <Description>CVE-2024-38608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226746</URL>
        <Description>SUSE Bug 1226746</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="234">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: carl9170: re-fix fortified-memset warning

The carl9170_tx_release() function sometimes triggers a fortified-memset
warning in my randconfig builds:

In file included from include/linux/string.h:254,
                 from drivers/net/wireless/ath/carl9170/tx.c:40:
In function 'fortify_memset_chk',
    inlined from 'carl9170_tx_release' at drivers/net/wireless/ath/carl9170/tx.c:283:2,
    inlined from 'kref_put' at include/linux/kref.h:65:3,
    inlined from 'carl9170_tx_put_skb' at drivers/net/wireless/ath/carl9170/tx.c:342:9:
include/linux/fortify-string.h:493:25: error: call to '__write_overflow_field' declared with attribute warning: detected write beyond size of field (1st parameter); maybe use struct_group()? [-Werror=attribute-warning]
  493 |                         __write_overflow_field(p_size_field, size);

Kees previously tried to avoid this by using memset_after(), but it seems
this does not fully address the problem. I noticed that the memset_after()
here is done on a different part of the union (status) than the original
cast was from (rate_driver_data), which may confuse the compiler.

Unfortunately, the memset_after() trick does not work on driver_rates[]
because that is part of an anonymous struct, and I could not get
struct_group() to do this either. Using two separate memset() calls
on the two members does address the warning though.</Note>
    </Notes>
    <CVE>CVE-2024-38616</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38616.html</URL>
        <Description>CVE-2024-38616</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226852</URL>
        <Description>SUSE Bug 1226852</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="235">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ALSA: timer: Set lower bound of start tick time

Currently ALSA timer doesn't have the lower limit of the start tick
time, and it allows a very small size, e.g. 1 tick with 1ns resolution
for hrtimer.  Such a situation may lead to an unexpected RCU stall,
where  the callback repeatedly queuing the expire update, as reported
by fuzzer.

This patch introduces a sanity check of the timer start tick time, so
that the system returns an error when a too small start size is set.
As of this patch, the lower limit is hard-coded to 100us, which is
small enough but can still work somehow.</Note>
    </Notes>
    <CVE>CVE-2024-38618</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38618.html</URL>
        <Description>CVE-2024-38618</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226754</URL>
        <Description>SUSE Bug 1226754</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="236">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

usb-storage: alauda: Check whether the media is initialized

The member "uzonesize" of struct alauda_info will remain 0
if alauda_init_media() fails, potentially causing divide errors
in alauda_read_data() and alauda_write_lba().
- Add a member "media_initialized" to struct alauda_info.
- Change a condition in alauda_check_media() to ensure the
  first initialization.
- Add an error check for the return value of alauda_init_media().</Note>
    </Notes>
    <CVE>CVE-2024-38619</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38619.html</URL>
        <Description>CVE-2024-38619</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226861</URL>
        <Description>SUSE Bug 1226861</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="237">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

media: stk1160: fix bounds checking in stk1160_copy_video()

The subtract in this condition is reversed.  The -&gt;length is the length
of the buffer.  The -&gt;bytesused is how many bytes we have copied thus
far.  When the condition is reversed that means the result of the
subtraction is always negative but since it's unsigned then the result
is a very high positive value.  That means the overflow check is never
true.

Additionally, the -&gt;bytesused doesn't actually work for this purpose
because we're not writing to "buf-&gt;mem + buf-&gt;bytesused".  Instead, the
math to calculate the destination where we are writing is a bit
involved.  You calculate the number of full lines already written,
multiply by two, skip a line if necessary so that we start on an odd
numbered line, and add the offset into the line.

To fix this buffer overflow, just take the actual destination where we
are writing, if the offset is already out of bounds print an error and
return.  Otherwise, write up to buf-&gt;length bytes.</Note>
    </Notes>
    <CVE>CVE-2024-38621</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38621.html</URL>
        <Description>CVE-2024-38621</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226895</URL>
        <Description>SUSE Bug 1226895</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="238">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

stm class: Fix a double free in stm_register_device()

The put_device(&amp;stm-&gt;dev) call will trigger stm_device_release() which
frees "stm" so the vfree(stm) on the next line is a double free.</Note>
    </Notes>
    <CVE>CVE-2024-38627</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38627.html</URL>
        <Description>CVE-2024-38627</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226857</URL>
        <Description>SUSE Bug 1226857</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="239">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger

When the cpu5wdt module is removing, the origin code uses del_timer() to
de-activate the timer. If the timer handler is running, del_timer() could
not stop it and will return directly. If the port region is released by
release_region() and then the timer handler cpu5wdt_trigger() calls outb()
to write into the region that is released, the use-after-free bug will
happen.

Change del_timer() to timer_shutdown_sync() in order that the timer handler
could be finished before the port region is released.</Note>
    </Notes>
    <CVE>CVE-2024-38630</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38630.html</URL>
        <Description>CVE-2024-38630</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226908</URL>
        <Description>SUSE Bug 1226908</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="240">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

serial: max3100: Update uart_driver_registered on driver removal

The removal of the last MAX3100 device triggers the removal of
the driver. However, code doesn't update the respective global
variable and after insmod — rmmod — insmod cycle the kernel
oopses:

  max3100 spi-PRP0001:01: max3100_probe: adding port 0
  BUG: kernel NULL pointer dereference, address: 0000000000000408
  ...
  RIP: 0010:serial_core_register_port+0xa0/0x840
  ...
   max3100_probe+0x1b6/0x280 [max3100]
   spi_probe+0x8d/0xb0

Update the actual state so next time UART driver will be registered
again.

Hugo also noticed, that the error path in the probe also affected
by having the variable set, and not cleared. Instead of clearing it
move the assignment after the successfull uart_register_driver() call.</Note>
    </Notes>
    <CVE>CVE-2024-38633</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38633.html</URL>
        <Description>CVE-2024-38633</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226867</URL>
        <Description>SUSE Bug 1226867</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="241">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

serial: max3100: Lock port-&gt;lock when calling uart_handle_cts_change()

uart_handle_cts_change() has to be called with port lock taken,
Since we run it in a separate work, the lock may not be taken at
the time of running. Make sure that it's taken by explicitly doing
that. Without it we got a splat:

  WARNING: CPU: 0 PID: 10 at drivers/tty/serial/serial_core.c:3491 uart_handle_cts_change+0xa6/0xb0
  ...
  Workqueue: max3100-0 max3100_work [max3100]
  RIP: 0010:uart_handle_cts_change+0xa6/0xb0
  ...
   max3100_handlerx+0xc5/0x110 [max3100]
   max3100_work+0x12a/0x340 [max3100]</Note>
    </Notes>
    <CVE>CVE-2024-38634</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38634.html</URL>
        <Description>CVE-2024-38634</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226868</URL>
        <Description>SUSE Bug 1226868</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="242">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

soundwire: cadence: fix invalid PDI offset

For some reason, we add an offset to the PDI, presumably to skip the
PDI0 and PDI1 which are reserved for BPT.

This code is however completely wrong and leads to an out-of-bounds
access. We were just lucky so far since we used only a couple of PDIs
and remained within the PDI array bounds.

A Fixes: tag is not provided since there are no known platforms where
the out-of-bounds would be accessed, and the initial code had problems
as well.

A follow-up patch completely removes this useless offset.</Note>
    </Notes>
    <CVE>CVE-2024-38635</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38635.html</URL>
        <Description>CVE-2024-38635</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226863</URL>
        <Description>SUSE Bug 1226863</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="243">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

enic: Validate length of nl attributes in enic_set_vf_port

enic_set_vf_port assumes that the nl attribute IFLA_PORT_PROFILE
is of length PORT_PROFILE_MAX and that the nl attributes
IFLA_PORT_INSTANCE_UUID, IFLA_PORT_HOST_UUID are of length PORT_UUID_MAX.
These attributes are validated (in the function do_setlink in rtnetlink.c)
using the nla_policy ifla_port_policy. The policy defines IFLA_PORT_PROFILE
as NLA_STRING, IFLA_PORT_INSTANCE_UUID as NLA_BINARY and
IFLA_PORT_HOST_UUID as NLA_STRING. That means that the length validation
using the policy is for the max size of the attributes and not on exact
size so the length of these attributes might be less than the sizes that
enic_set_vf_port expects. This might cause an out of bands
read access in the memcpys of the data of these
attributes in enic_set_vf_port.</Note>
    </Notes>
    <CVE>CVE-2024-38659</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38659.html</URL>
        <Description>CVE-2024-38659</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226883</URL>
        <Description>SUSE Bug 1226883</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="244">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

s390/ap: Fix crash in AP internal function modify_bitmap()

A system crash like this

  Failing address: 200000cb7df6f000 TEID: 200000cb7df6f403
  Fault in home space mode while using kernel ASCE.
  AS:00000002d71bc007 R3:00000003fe5b8007 S:000000011a446000 P:000000015660c13d
  Oops: 0038 ilc:3 [#1] PREEMPT SMP
  Modules linked in: mlx5_ib ...
  CPU: 8 PID: 7556 Comm: bash Not tainted 6.9.0-rc7 #8
  Hardware name: IBM 3931 A01 704 (LPAR)
  Krnl PSW : 0704e00180000000 0000014b75e7b606 (ap_parse_bitmap_str+0x10e/0x1f8)
  R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:2 PM:0 RI:0 EA:3
  Krnl GPRS: 0000000000000001 ffffffffffffffc0 0000000000000001 00000048f96b75d3
  000000cb00000100 ffffffffffffffff ffffffffffffffff 000000cb7df6fce0
  000000cb7df6fce0 00000000ffffffff 000000000000002b 00000048ffffffff
  000003ff9b2dbc80 200000cb7df6fcd8 0000014bffffffc0 000000cb7df6fbc8
  Krnl Code: 0000014b75e7b5fc: a7840047            brc     8,0000014b75e7b68a
  0000014b75e7b600: 18b2                lr      %r11,%r2
  #0000014b75e7b602: a7f4000a            brc     15,0000014b75e7b616
  &gt;0000014b75e7b606: eb22d00000e6        laog    %r2,%r2,0(%r13)
  0000014b75e7b60c: a7680001            lhi     %r6,1
  0000014b75e7b610: 187b                lr      %r7,%r11
  0000014b75e7b612: 84960021            brxh    %r9,%r6,0000014b75e7b654
  0000014b75e7b616: 18e9                lr      %r14,%r9
  Call Trace:
  [&lt;0000014b75e7b606&gt;] ap_parse_bitmap_str+0x10e/0x1f8
  ([&lt;0000014b75e7b5dc&gt;] ap_parse_bitmap_str+0xe4/0x1f8)
  [&lt;0000014b75e7b758&gt;] apmask_store+0x68/0x140
  [&lt;0000014b75679196&gt;] kernfs_fop_write_iter+0x14e/0x1e8
  [&lt;0000014b75598524&gt;] vfs_write+0x1b4/0x448
  [&lt;0000014b7559894c&gt;] ksys_write+0x74/0x100
  [&lt;0000014b7618a440&gt;] __do_syscall+0x268/0x328
  [&lt;0000014b761a3558&gt;] system_call+0x70/0x98
  INFO: lockdep is turned off.
  Last Breaking-Event-Address:
  [&lt;0000014b75e7b636&gt;] ap_parse_bitmap_str+0x13e/0x1f8
  Kernel panic - not syncing: Fatal exception: panic_on_oops

occured when /sys/bus/ap/a[pq]mask was updated with a relative mask value
(like +0x10-0x12,+60,-90) with one of the numeric values exceeding INT_MAX.

The fix is simple: use unsigned long values for the internal variables. The
correct checks are already in place in the function but a simple int for
the internal variables was used with the possibility to overflow.</Note>
    </Notes>
    <CVE>CVE-2024-38661</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38661.html</URL>
        <Description>CVE-2024-38661</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226996</URL>
        <Description>SUSE Bug 1226996</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="245">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

dma-buf/sw-sync: don't enable IRQ from sync_print_obj()

Since commit a6aa8fca4d79 ("dma-buf/sw-sync: Reduce irqsave/irqrestore from
known context") by error replaced spin_unlock_irqrestore() with
spin_unlock_irq() for both sync_debugfs_show() and sync_print_obj() despite
sync_print_obj() is called from sync_debugfs_show(), lockdep complains
inconsistent lock state warning.

Use plain spin_{lock,unlock}() for sync_print_obj(), for
sync_debugfs_show() is already using spin_{lock,unlock}_irq().</Note>
    </Notes>
    <CVE>CVE-2024-38780</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38780.html</URL>
        <Description>CVE-2024-38780</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226886</URL>
        <Description>SUSE Bug 1226886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="246">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/9p: fix uninit-value in p9_client_rpc()

Syzbot with the help of KMSAN reported the following error:

BUG: KMSAN: uninit-value in trace_9p_client_res include/trace/events/9p.h:146 [inline]
BUG: KMSAN: uninit-value in p9_client_rpc+0x1314/0x1340 net/9p/client.c:754
 trace_9p_client_res include/trace/events/9p.h:146 [inline]
 p9_client_rpc+0x1314/0x1340 net/9p/client.c:754
 p9_client_create+0x1551/0x1ff0 net/9p/client.c:1031
 v9fs_session_init+0x1b9/0x28e0 fs/9p/v9fs.c:410
 v9fs_mount+0xe2/0x12b0 fs/9p/vfs_super.c:122
 legacy_get_tree+0x114/0x290 fs/fs_context.c:662
 vfs_get_tree+0xa7/0x570 fs/super.c:1797
 do_new_mount+0x71f/0x15e0 fs/namespace.c:3352
 path_mount+0x742/0x1f20 fs/namespace.c:3679
 do_mount fs/namespace.c:3692 [inline]
 __do_sys_mount fs/namespace.c:3898 [inline]
 __se_sys_mount+0x725/0x810 fs/namespace.c:3875
 __x64_sys_mount+0xe4/0x150 fs/namespace.c:3875
 do_syscall_64+0xd5/0x1f0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

Uninit was created at:
 __alloc_pages+0x9d6/0xe70 mm/page_alloc.c:4598
 __alloc_pages_node include/linux/gfp.h:238 [inline]
 alloc_pages_node include/linux/gfp.h:261 [inline]
 alloc_slab_page mm/slub.c:2175 [inline]
 allocate_slab mm/slub.c:2338 [inline]
 new_slab+0x2de/0x1400 mm/slub.c:2391
 ___slab_alloc+0x1184/0x33d0 mm/slub.c:3525
 __slab_alloc mm/slub.c:3610 [inline]
 __slab_alloc_node mm/slub.c:3663 [inline]
 slab_alloc_node mm/slub.c:3835 [inline]
 kmem_cache_alloc+0x6d3/0xbe0 mm/slub.c:3852
 p9_tag_alloc net/9p/client.c:278 [inline]
 p9_client_prepare_req+0x20a/0x1770 net/9p/client.c:641
 p9_client_rpc+0x27e/0x1340 net/9p/client.c:688
 p9_client_create+0x1551/0x1ff0 net/9p/client.c:1031
 v9fs_session_init+0x1b9/0x28e0 fs/9p/v9fs.c:410
 v9fs_mount+0xe2/0x12b0 fs/9p/vfs_super.c:122
 legacy_get_tree+0x114/0x290 fs/fs_context.c:662
 vfs_get_tree+0xa7/0x570 fs/super.c:1797
 do_new_mount+0x71f/0x15e0 fs/namespace.c:3352
 path_mount+0x742/0x1f20 fs/namespace.c:3679
 do_mount fs/namespace.c:3692 [inline]
 __do_sys_mount fs/namespace.c:3898 [inline]
 __se_sys_mount+0x725/0x810 fs/namespace.c:3875
 __x64_sys_mount+0xe4/0x150 fs/namespace.c:3875
 do_syscall_64+0xd5/0x1f0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

If p9_check_errors() fails early in p9_client_rpc(), req-&gt;rc.tag
will not be properly initialized. However, trace_9p_client_res()
ends up trying to print it out anyway before p9_client_rpc()
finishes.

Fix this issue by assigning default values to p9_fcall fields
such as 'tag' and (just in case KMSAN unearths something new) 'id'
during the tag allocation stage.</Note>
    </Notes>
    <CVE>CVE-2024-39301</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-39301.html</URL>
        <Description>CVE-2024-39301</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226994</URL>
        <Description>SUSE Bug 1226994</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="247">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix deadlock in smb2_find_smb_tcon()

Unlock cifs_tcp_ses_lock before calling cifs_put_smb_ses() to avoid such
deadlock.</Note>
    </Notes>
    <CVE>CVE-2024-39468</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-39468.html</URL>
        <Description>CVE-2024-39468</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227103</URL>
        <Description>SUSE Bug 1227103</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="248">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors

The error handling in nilfs_empty_dir() when a directory folio/page read
fails is incorrect, as in the old ext2 implementation, and if the
folio/page cannot be read or nilfs_check_folio() fails, it will falsely
determine the directory as empty and corrupt the file system.

In addition, since nilfs_empty_dir() does not immediately return on a
failed folio/page read, but continues to loop, this can cause a long loop
with I/O if i_size of the directory's inode is also corrupted, causing the
log writer thread to wait and hang, as reported by syzbot.

Fix these issues by making nilfs_empty_dir() immediately return a false
value (0) if it fails to get a directory folio/page.</Note>
    </Notes>
    <CVE>CVE-2024-39469</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-39469.html</URL>
        <Description>CVE-2024-39469</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226992</URL>
        <Description>SUSE Bug 1226992</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="249">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: add error handle to avoid out-of-bounds

if the sdma_v4_0_irq_id_to_seq return -EINVAL, the process should
be stop to avoid out-of-bounds read, so directly return -EINVAL.</Note>
    </Notes>
    <CVE>CVE-2024-39471</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro/rt-5.5:latest:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.61.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.61.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-39471.html</URL>
        <Description>CVE-2024-39471</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227096</URL>
        <Description>SUSE Bug 1227096</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
