<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:2901-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-08-14T07:24:46Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-08-14T07:24:46Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-08-14T07:24:46Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716).
- CVE-2024-42096: x86: stop playing stack games in profile_pc() (bsc#1228633).
- CVE-2024-39506: liquidio: adjust a NULL pointer handling path in lio_vf_rep_copy_packet (bsc#1227729).
- CVE-2021-47619: i40e: Fix queues reservation for XDP (bsc#1226645).
- CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743).
- CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible (bsc#1228705).
- CVE-2024-42223: media: dvb-frontends: tda10048: Fix integer overflow (bsc#1228726).
- CVE-2024-42119: drm/amd/display: Skip finding free audio for unknown engine_id (bsc#1228584).
- CVE-2024-42120: drm/amd/display: Check pipe offset before setting vblank (bsc#1228588).
- CVE-2024-41095: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes (bsc#1228662).
- CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list (bsc#1228723).
- CVE-2024-41072: wifi: cfg80211: wext: add extra SIOCSIWSCAN data check (bsc#1228626).
- CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg (bsc#1228565).
- CVE-2024-40995: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (bsc#1227830).
- CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed packets (bsc#1228530).
- CVE-2024-41066: ibmvnic: add tx check to prevent skb leak (bsc#1228640).
- CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack (bsc#1228680).
- CVE-2024-41089: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes (bsc#1228658).
- CVE-2024-41060: drm/radeon: check bo_va-&gt;bo is non-NULL before using it (bsc#1228567).
- CVE-2022-48829: NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes (bsc#1228055).
- CVE-2022-48828: NFSD: Fix ia_size underflow (bsc#1228054).
- CVE-2022-48827: NFSD: Fix the behavior of READ near OFFSET_MAX (bsc#1228037).
- CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota disable failure (bsc#1228655).
- CVE-2024-41071: wifi: mac80211: Avoid address calculations via out of bounds array indexing (bsc#1228625).
- CVE-2024-41064: powerpc/eeh: avoid possible crash when edev-&gt;pdev changes (bsc#1228599).
- CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1224700).
- CVE-2024-41081: ila: block BH in ila_output() (bsc#1228617).
- CVE-2024-40978: scsi: qedi: Fix crash while reading debugfs attribute (bsc#1227929).
- CVE-2022-48792: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task (bsc#1228013).
- CVE-2022-48823: scsi: qedf: Fix refcount issue when LOGO is received during TMF (bsc#1228045).
- CVE-2024-41076: NFSv4: Fix memory leak in nfs4_set_security_label (bsc#1228649).
- CVE-2024-40998: ext4: fix uninitialized ratelimit_state-&gt;lock access in __ext4_fill_super() (bsc#1227866).
- CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).
- CVE-2024-40987: drm/amdgpu: fix UBSAN warning in kv_dpm.c (bsc#1228235).
- CVE-2022-48826: drm/vc4: Fix deadlock on DSI device attach error (bsc#1227975)
- CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ (bsc#1222625).
- CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry() (bsc#1228409).
- CVE-2024-41016: ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410).
- CVE-2024-41063: bluetooth: hci_core: cancel all works upon hci_unregister_dev() (bsc#1228580).
- CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (bsc#1228470).
- CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group() (bsc#1228581).
- CVE-2021-47405: HID: usbhid: free raw_report buffers in usbhid_stop (bsc#1225238).
- CVE-2024-40988: drm/radeon: fix UBSAN warning in kv_dpm.c (bsc#1227957).
- CVE-2024-40932: drm/exynos/vidi: fix memory leak in .get_modes() (bsc#1227828).
- CVE-2021-47403: ipack: ipoctal: fix module reference leak (bsc#1225241).
- CVE-2021-47388: mac80211: fix use-after-free in CCMP/GCMP RX (bsc#1225214).
- CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data (bsc#1228408).
- CVE-2024-41091: tun: add missing verification for short frame (bsc#1228327).
- CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).
- CVE-2024-40999: net: ena: Add validation for completion descriptors consistency (bsc#1227913).
- CVE-2024-35837: net: mvpp2: clear BM pool before initialization (bsc#1224500).
- CVE-2021-47588: sit: do not call ipip6_dev_free() from sit_init_net() (bsc#1226568).
- CVE-2022-48804: vt_ioctl: fix array_index_nospec in vt_setactivate (bsc#1227968).
- CVE-2024-40967: serial: imx: Introduce timeout when waiting on transmitter empty (bsc#1227891).
- CVE-2024-40966: kABI: tty: add the option to have a tty reject a new ldisc (bsc#1227886).
- CVE-2022-48850: net-sysfs: add check for netdevice being present to speed_show (bsc#1228071).
- CVE-2021-47582: usb: core: Do not hold the device lock while sleeping in do_proc_control() (bsc#1226559).
- CVE-2024-40982: ssb: fix potential NULL pointer dereference in ssb_device_uevent() (bsc#1227865).
- CVE-2021-47468: isdn: mISDN: Fix sleeping function called from invalid context (bsc#1225346).
- CVE-2021-47395: mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap (bsc#1225326).
- CVE-2022-48810: ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path (bsc#1227936).
- CVE-2023-52594: Fixed potential array-index-out-of-bounds read in ath9k_htc_txstatus() (bsc#1221045).
- CVE-2022-48855: sctp: fix kernel-infoleak for SCTP sockets (bsc#1228003).
- CVE-2021-47580: scsi: scsi_debug: Fix type in min_t to avoid stack OOB (bsc#1226550).
- CVE-2024-26735: ipv6: sr: fix possible use-after-free and null-ptr-deref (bsc#1222372).
- CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786).
- CVE-2022-48811: ibmvnic: do not release napi in __ibmvnic_open() (bsc#1227928).
- CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bsc#1186463).
- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (bsc#1179610).
- CVE-2024-40937: gve: Clear napi-&gt;skb before dev_kfree_skb_any() (bsc#1227836).
- CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent scenario (bsc#1227730).
- CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation failure (bsc#1227786).
- CVE-2024-40941: wifi: iwlwifi: mvm: do not read past the mfuart notifcation (bsc#1227771).
- CVE-2022-48860: ethernet: Fix error handling in xemaclite_of_probe (bsc#1228008).
- CVE-2022-48863: mISDN: Fix memory leak in dsp_pipeline_build() (bsc#1228063).
- CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() (bsc#1227806).
- CVE-2024-39499: vmci: prevent speculation leaks by sanitizing event in event_deliver() (bsc#1227725).
- CVE-2024-39487: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() (bsc#1227573)
- CVE-2024-35934: net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list() (bsc#1224641)
- CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (bsc#1227884).
- CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak (bsc#1224512)
- CVE-2021-47441: mlxsw: thermal: Fix out-of-bounds memory accesses (bsc#1225224)
- CVE-2021-47194: cfg80211: call cfg80211_stop_ap when switch from P2P_GO type (bsc#1222829).
- CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (bsc#1223815)
- CVE-2022-48775: Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj (bsc#1227924).
- CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (bsc#1223813)
- CVE-2024-40929: wifi: iwlwifi: mvm: check n_ssids before accessing the ssids (bsc#1227774).
- CVE-2024-40912: wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() (bsc#1227790).
- CVE-2024-40942: wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects (bsc#1227770).
- CVE-2022-48857: NFC: port100: fix use-after-free in port100_send_complete (bsc#1228005).
- CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() (bsc#1225719).
- CVE-2021-47606: net: netlink: af_netlink: Prevent empty skb by adding a check on len. (bsc#1226555).
- CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory (bsc#1227762).
- CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820).
- CVE-2024-26830: Fixed i40e to not allow untrusted VF to remove administratively set MAC (bsc#1223012).
- CVE-2021-47516: nfp: Fix memory leak in nfp_cpp_area_cache_add() (bsc#1225427).
- CVE-2021-47501: i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc (bsc#1225361).
- CVE-2024-39501: drivers: core: synchronize really_probe() and dev_uevent() (bsc#1227754).
- CVE-2023-52743: ice: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1225003)
- CVE-2021-47542: net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() (bsc#1225455).
- CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output() (bsc#1225711)
- CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1224545)
- CVE-2024-27025: nbd: null check for nla_nest_start (bsc#1223778)
- CVE-2021-47599: btrfs: use latest_dev in btrfs_show_devname (bsc#1226571).
- CVE-2023-52435: net: prevent mss overflow in skb_segment() (bsc#1220138).
- CVE-2024-26663: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() (bsc#1222326).
- CVE-2021-47597: inet_diag: fix kernel-infoleak for UDP sockets (bsc#1226553).
- CVE-2024-39490: ipv6: sr: fix missing sk_buff release in seg6_input_core (bsc#1227626).
- CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple for ICMPv6 (bsc#1226783).
- CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection dump (bsc#1220942).
- CVE-2023-52619: Fixed possible crash when setting number of cpus to an odd number in pstore/ram (bsc#1221618).
- CVE-2024-26659: Fixed wrong handling of isoc Babble and Buffer Overrun events in xhci (bsc#1222317).
- CVE-2024-35978: Bluetooth: Fix memory leak in hci_req_sync_complete() (bsc#1224571).
- CVE-2023-52669: crypto: s390/aes - Fix buffer overread in CTR mode (bsc#1224637).
- CVE-2023-52615: Fixed page fault dead lock on mmap-ed hwrng (bsc#1221614).
- CVE-2023-52612: Fixed req-&gt;dst buffer overflow in crypto/scomp (bsc#1221616).
- CVE-2024-35995: ACPI: CPPC: Use access_width over bit_width for system memory accesses (bsc#1224557).
- CVE-2023-52623: Fixed suspicious RCU usage in SUNRPC (bsc#1222060).
- CVE-2021-47295: net: sched: fix memory leak in tcindex_partial_destroy_work (bsc#1224975)
- CVE-2023-52693: ACPI: video: check for error while searching for backlight device parent (bsc#1224686).
- CVE-2023-52683: ACPI: LPIT: Avoid u32 multiplication overflow (bsc#1224627).
- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).
- CVE-2024-39475: fbdev: savage: Handle err return when savagefb_check_var failed (bsc#1227435)
- CVE-2021-47520: can: pch_can: pch_can_rx_normal: fix use after free (bsc#1225431).
- CVE-2024-36941: wifi: nl80211: do not free NULL coalescing rule (bsc#1225835).
- CVE-2021-47145: btrfs: do not BUG_ON in link_to_fixup_dir (bsc#1222005).
- CVE-2021-47547: net: tulip: de4x5: fix the problem that the array 'lp-&gt;phy' may be out of bound (bsc#1225505).
- CVE-2023-52817: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL (bsc#1225569).
- CVE-2023-52819: drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga (bsc#1225532).
- CVE-2023-52818: drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 (bsc#1225530).
- CVE-2023-52753: drm/amd/display: Avoid NULL dereference of timing generator (bsc#1225478).
- CVE-2024-36014: drm/arm/malidp: fix a possible null pointer dereference (bsc#1225593).
- CVE-2024-26636: llc: make llc_ui_sendmsg() more robust against bonding changes (bsc#1221659).
- CVE-2024-26635: llc: Drop support for ETH_P_TR_802_2 (bsc#1221656).
- CVE-2024-35828: wifi: libertas: fix some memleaks in lbs_allocate_cmd_buffer() (bsc#1224622).
- CVE-2023-52507: Fixed possible shift-out-of-bounds in nfc/nci (bsc#1220833).
- CVE-2024-38598: md: fix resync softlockup when bitmap size is less than array size (bsc#1226757).
- CVE-2024-35805: dm snapshot: fix lockup in dm_exception_table_exit (bsc#1224743).
- CVE-2024-26880: dm: call the resume method on internal suspend (bsc#1223188).
- CVE-2021-47498: dm rq: do not queue request to blk-mq during DM suspend (bsc#1225357).
- CVE-2021-47275: bcache: avoid oversized read request in cache missing code path (bsc#1224965).
- CVE-2024-38619: usb-storage: alauda: Check whether the media is initialized (bsc#1226861).
- CVE-2021-47201: iavf: free q_vectors before queues in iavf_disable_vf (bsc#1222792).
- CVE-2024-26863: hsr: Fix uninit-value access in hsr_get_node() (bsc#1223021).
- CVE-2024-38630: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (bsc#1226908).
- CVE-2024-39301: net/9p: fix uninit-value in p9_client_rpc() (bsc#1226994).
- CVE-2021-47559: net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk() (bsc#1225396).

The following non-security bugs were fixed:

- Fix spurious WARNING caused by a qxl driver patch (bsc#1227213,bsc#1227191)
- KVM: PPC: Book3S HV: Do not take kvm-&gt;lock around kvm_for_each_vcpu (bsc#1065729).
- KVM: PPC: Book3S HV: remove extraneous asterisk from rm_host_ipi_action() comment (bsc#1065729).
- KVM: PPC: Book3S PR: Exiting split hack mode needs to fixup both PC and LR (bsc#1065729).
- KVM: PPC: Book3S: Fix some RCU-list locks (git-fixes).
- KVM: PPC: Book3S: Only report KVM_CAP_SPAPR_TCE_VFIO on powernv machines (bsc#1065729).
- KVM: PPC: Book3S: Use new mutex to synchronize access to rtas token list (bsc#1065729).
- KVM: PPC: Inform the userspace about TCE update failures (bsc#1065729).
- KVM: PPC: Move and undef TRACE_INCLUDE_PATH/FILE (bsc#1065729).
- PCI: Fix resource double counting on remove &amp; rescan (git-fixes).
- PCI: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN (git-fixes).
- PM: hibernate: x86: Use crc32 instead of md5 for hibernation e820 integrity check (git-fixes).
- SUNRPC: Fix gss_free_in_token_pages() (git-fixes).
- SUNRPC: Fix loop termination condition in gss_free_in_token_pages() (git-fixes).
- Tools: hv: kvp: eliminate 'may be used uninitialized' warning (git-fixes).
- USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (git-fixes).
- btrfs: fix 64bit compat send ioctl arguments not initializing version member (bsc#1228030).
- btrfs: fix send ioctl on 32bit with 64bit kernel (bsc#1228030).
- btrfs: incremental send, fix emission of invalid clone operations (bsc#1228030).
- btrfs: remove unused members dir_path from recorded_ref (bsc#1228030).
- btrfs: send, improve clone range (bsc#1228030).
- btrfs: send: add new command FILEATTR for file attributes (bsc#1228030).
- btrfs: send: add stream v2 definitions (bsc#1228030).
- btrfs: send: always use the rbtree based inode ref management infrastructure (bsc#1228030).
- btrfs: send: avoid copying file data (bsc#1228030).
- btrfs: send: explicitly number commands and attributes (bsc#1228030).
- btrfs: send: fix failures when processing inodes with no links (bsc#1228030).
- btrfs: send: fix send failure of a subcase of orphan inodes (bsc#1228030).
- btrfs: send: fix sending link commands for existing file paths (bsc#1228030).
- btrfs: send: get rid of i_size logic in send_write() (bsc#1228030).
- btrfs: send: introduce recorded_ref_alloc and recorded_ref_free (bsc#1228030).
- btrfs: send: prepare for v2 protocol (bsc#1228030).
- btrfs: send: refactor arguments of get_inode_info() (bsc#1228030).
- btrfs: send: remove stale code when checking for shared extents (bsc#1228030).
- btrfs: send: remove unused found_type parameter to lookup_dir_item_inode() (bsc#1228030).
- btrfs: send: remove unused send_ctx::{total,cmd}_send_size (bsc#1228030).
- btrfs: send: use boolean types for current inode status (bsc#1228030).
- btrfs: silence maybe-uninitialized warning in clone_range (bsc#1228030).
- drm/amdgpu/debugfs: fix error code when smc register accessors are NULL (git-fixes).
- drm/vc4: dsi: Only register our component once a DSI device is (bsc#1227975)
- hv_netvsc: rndis_filter needs to select NLS (git-fixes).
- ipv6: sr: fix incorrect unregister order (git-fixes).
- kgdb: Add kgdb_has_hit_break function (git-fixes).
- kgdb: Move the extern declaration kgdb_has_hit_break() to generic kgdb.h (git-fixes).
- net: hsr: fix placement of logical operator in a multi-line statement (bsc#1223021).
- net: mana: Fix the extra HZ in mana_hwc_send_request (git-fixes).
- net: mana: select PAGE_POOL (git-fixes).
- net_sched: add a temporary refcnt for struct tcindex_data (bsc#1224975).
- net_sched: fix a memory leak in cls_tcindex (bsc#1224975).
- net_sched: fix a missing refcnt in tcindex_init() (bsc#1224975).
- net_sched: hold rtnl lock in tcindex_partial_destroy_work() (bsc#1224975)
- nfs: Handle error of rpc_proc_register() in nfs_net_init() (git-fixes).
- nvme: fixup comment for nvme RDMA Provider Type (git-fixes).
- ocfs2: fix DIO failure due to insufficient transaction credits (bsc#1216834).
- ocfs2: remove redundant assignment to variable free_space (bsc#1228409).
- ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410).
- powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() (bsc#1227487).
- sched/deadline: Fix BUG_ON condition for deboosted tasks (bsc#1227407).
- scsi: qla2xxx: Avoid possible run-time warning with long model_num (bsc#1228850).
- scsi: qla2xxx: Complete command early within lock (bsc#1228850).
- scsi: qla2xxx: Convert comma to semicolon (bsc#1228850).
- scsi: qla2xxx: Drop driver owner assignment (bsc#1228850).
- scsi: qla2xxx: During vport delete send async logout explicitly (bsc#1228850).
- scsi: qla2xxx: Fix debugfs output for fw_resource_count (bsc#1228850).
- scsi: qla2xxx: Fix flash read failure (bsc#1228850).
- scsi: qla2xxx: Fix for possible memory corruption (bsc#1228850).
- scsi: qla2xxx: Fix optrom version displayed in FDMI (bsc#1228850).
- scsi: qla2xxx: Reduce fabric scan duplicate code (bsc#1228850).
- scsi: qla2xxx: Remove unused struct 'scsi_dif_tuple' (bsc#1228850).
- scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds (bsc#1228850).
- scsi: qla2xxx: Unable to act on RSCN for port online (bsc#1228850).
- scsi: qla2xxx: Update version to 10.02.09.300-k (bsc#1228850).
- scsi: qla2xxx: Use QP lock to search for bsg (bsc#1228850).
- scsi: qla2xxx: validate nvme_local_port correctly (bsc#1228850).
- signal: Introduce clear_siginfo (git-fixes).
- string.h: Introduce memtostr() and memtostr_pad() (bsc#1228850).
- sunrpc: fix NFSACL RPC retry on soft mount (git-fixes).
- tools lib: Fix builds when glibc contains strlcpy() (git-fixes).
- tools: hv: fix KVP and VSS daemons exit code (git-fixes).
- usb: add a hcd_uses_dma helper (git-fixes).
- usb: atm: cxacru: fix endpoint checking in cxacru_bind() (git-fixes).
- usb: musb: da8xx: fix a resource leak in probe() (git-fixes).
- x86/apic: Fix kernel panic when booting with intremap=off and x2apic_phys (git-fixes).
- x86/bhi: Avoid warning in #DB handler due to BHI mitigation (git-fixes).
- x86/boot/e820: Fix typo in e820.c comment (git-fixes).
- x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (git-fixes).
- x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with CONFIG_MITIGATION_SPECTRE_BHI (git-fixes).
- x86/cpu: Fix AMD erratum #1485 on Zen4-based CPUs (git-fixes).
- x86/fpu: Return proper error codes from user access functions (git-fixes).
- x86/ioremap: Fix page aligned size calculation in __ioremap_caller() (git-fixes).
- x86/kprobes: Fix kprobes instruction boudary check with CONFIG_RETHUNK (git-fixes).
- x86/kprobes: Fix optprobe optimization check with CONFIG_RETHUNK (git-fixes).
- x86/msr: Fix wr/rdmsr_safe_regs_on_cpu() prototypes (git-fixes).
- x86/numa: Use cpumask_available instead of hardcoded NULL check (git-fixes).
- x86: __memcpy_flushcache: fix wrong alignment if size &gt; 2^32 (git-fixes).
- xfs: check that dir block entries do not off the end of the buffer (git-fixes).
- xfs: refactor xfs_verifier_error and xfs_buf_ioerror (git-fixes).
- xfs: remove XFS_WANT_CORRUPTED_RETURN from dir3 data verifiers (git-fixes).
- xhci: Poll for U0 after disabling USB2 LPM (git-fixes).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Image SLES12-SP5-Azure-HPC-On-Demand-2024-2901,Image SLES12-SP5-Azure-Standard-On-Demand-2024-2901,SUSE-2024-2901,SUSE-SLE-SERVER-12-SP5-2024-2901</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      <Description>Link for SUSE-SU-2024:2901-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:2901-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1065729</URL>
      <Description>SUSE Bug 1065729</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1088701</URL>
      <Description>SUSE Bug 1088701</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1149446</URL>
      <Description>SUSE Bug 1149446</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179610</URL>
      <Description>SUSE Bug 1179610</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1186463</URL>
      <Description>SUSE Bug 1186463</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1196018</URL>
      <Description>SUSE Bug 1196018</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1202346</URL>
      <Description>SUSE Bug 1202346</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1215420</URL>
      <Description>SUSE Bug 1215420</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1216834</URL>
      <Description>SUSE Bug 1216834</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1220138</URL>
      <Description>SUSE Bug 1220138</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1220833</URL>
      <Description>SUSE Bug 1220833</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1220942</URL>
      <Description>SUSE Bug 1220942</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221045</URL>
      <Description>SUSE Bug 1221045</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221614</URL>
      <Description>SUSE Bug 1221614</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221616</URL>
      <Description>SUSE Bug 1221616</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221618</URL>
      <Description>SUSE Bug 1221618</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221656</URL>
      <Description>SUSE Bug 1221656</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221659</URL>
      <Description>SUSE Bug 1221659</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222005</URL>
      <Description>SUSE Bug 1222005</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222060</URL>
      <Description>SUSE Bug 1222060</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222317</URL>
      <Description>SUSE Bug 1222317</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222326</URL>
      <Description>SUSE Bug 1222326</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222372</URL>
      <Description>SUSE Bug 1222372</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222625</URL>
      <Description>SUSE Bug 1222625</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222776</URL>
      <Description>SUSE Bug 1222776</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222792</URL>
      <Description>SUSE Bug 1222792</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222824</URL>
      <Description>SUSE Bug 1222824</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222829</URL>
      <Description>SUSE Bug 1222829</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222866</URL>
      <Description>SUSE Bug 1222866</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223012</URL>
      <Description>SUSE Bug 1223012</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223021</URL>
      <Description>SUSE Bug 1223021</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223188</URL>
      <Description>SUSE Bug 1223188</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223778</URL>
      <Description>SUSE Bug 1223778</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223813</URL>
      <Description>SUSE Bug 1223813</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223815</URL>
      <Description>SUSE Bug 1223815</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224500</URL>
      <Description>SUSE Bug 1224500</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224512</URL>
      <Description>SUSE Bug 1224512</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224545</URL>
      <Description>SUSE Bug 1224545</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224557</URL>
      <Description>SUSE Bug 1224557</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224571</URL>
      <Description>SUSE Bug 1224571</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224576</URL>
      <Description>SUSE Bug 1224576</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224587</URL>
      <Description>SUSE Bug 1224587</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224622</URL>
      <Description>SUSE Bug 1224622</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224627</URL>
      <Description>SUSE Bug 1224627</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224637</URL>
      <Description>SUSE Bug 1224637</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224641</URL>
      <Description>SUSE Bug 1224641</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224647</URL>
      <Description>SUSE Bug 1224647</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224663</URL>
      <Description>SUSE Bug 1224663</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224683</URL>
      <Description>SUSE Bug 1224683</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224686</URL>
      <Description>SUSE Bug 1224686</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224699</URL>
      <Description>SUSE Bug 1224699</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224700</URL>
      <Description>SUSE Bug 1224700</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224743</URL>
      <Description>SUSE Bug 1224743</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224965</URL>
      <Description>SUSE Bug 1224965</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224975</URL>
      <Description>SUSE Bug 1224975</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225003</URL>
      <Description>SUSE Bug 1225003</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225214</URL>
      <Description>SUSE Bug 1225214</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225224</URL>
      <Description>SUSE Bug 1225224</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225229</URL>
      <Description>SUSE Bug 1225229</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225238</URL>
      <Description>SUSE Bug 1225238</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225241</URL>
      <Description>SUSE Bug 1225241</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225326</URL>
      <Description>SUSE Bug 1225326</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225328</URL>
      <Description>SUSE Bug 1225328</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225346</URL>
      <Description>SUSE Bug 1225346</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225357</URL>
      <Description>SUSE Bug 1225357</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225361</URL>
      <Description>SUSE Bug 1225361</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225396</URL>
      <Description>SUSE Bug 1225396</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225427</URL>
      <Description>SUSE Bug 1225427</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225431</URL>
      <Description>SUSE Bug 1225431</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225455</URL>
      <Description>SUSE Bug 1225455</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225478</URL>
      <Description>SUSE Bug 1225478</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225505</URL>
      <Description>SUSE Bug 1225505</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225530</URL>
      <Description>SUSE Bug 1225530</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225532</URL>
      <Description>SUSE Bug 1225532</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225569</URL>
      <Description>SUSE Bug 1225569</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225593</URL>
      <Description>SUSE Bug 1225593</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225711</URL>
      <Description>SUSE Bug 1225711</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225719</URL>
      <Description>SUSE Bug 1225719</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225767</URL>
      <Description>SUSE Bug 1225767</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225820</URL>
      <Description>SUSE Bug 1225820</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225835</URL>
      <Description>SUSE Bug 1225835</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225838</URL>
      <Description>SUSE Bug 1225838</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225898</URL>
      <Description>SUSE Bug 1225898</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226550</URL>
      <Description>SUSE Bug 1226550</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226553</URL>
      <Description>SUSE Bug 1226553</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226555</URL>
      <Description>SUSE Bug 1226555</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226559</URL>
      <Description>SUSE Bug 1226559</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226568</URL>
      <Description>SUSE Bug 1226568</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226571</URL>
      <Description>SUSE Bug 1226571</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226645</URL>
      <Description>SUSE Bug 1226645</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226757</URL>
      <Description>SUSE Bug 1226757</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226783</URL>
      <Description>SUSE Bug 1226783</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226786</URL>
      <Description>SUSE Bug 1226786</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226834</URL>
      <Description>SUSE Bug 1226834</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226861</URL>
      <Description>SUSE Bug 1226861</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226908</URL>
      <Description>SUSE Bug 1226908</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226994</URL>
      <Description>SUSE Bug 1226994</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227191</URL>
      <Description>SUSE Bug 1227191</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227213</URL>
      <Description>SUSE Bug 1227213</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227407</URL>
      <Description>SUSE Bug 1227407</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227435</URL>
      <Description>SUSE Bug 1227435</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227487</URL>
      <Description>SUSE Bug 1227487</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227573</URL>
      <Description>SUSE Bug 1227573</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227618</URL>
      <Description>SUSE Bug 1227618</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227626</URL>
      <Description>SUSE Bug 1227626</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227716</URL>
      <Description>SUSE Bug 1227716</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227725</URL>
      <Description>SUSE Bug 1227725</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227729</URL>
      <Description>SUSE Bug 1227729</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227730</URL>
      <Description>SUSE Bug 1227730</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227733</URL>
      <Description>SUSE Bug 1227733</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227750</URL>
      <Description>SUSE Bug 1227750</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227754</URL>
      <Description>SUSE Bug 1227754</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227762</URL>
      <Description>SUSE Bug 1227762</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227770</URL>
      <Description>SUSE Bug 1227770</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227771</URL>
      <Description>SUSE Bug 1227771</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227772</URL>
      <Description>SUSE Bug 1227772</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227774</URL>
      <Description>SUSE Bug 1227774</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227786</URL>
      <Description>SUSE Bug 1227786</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227790</URL>
      <Description>SUSE Bug 1227790</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227806</URL>
      <Description>SUSE Bug 1227806</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227824</URL>
      <Description>SUSE Bug 1227824</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227828</URL>
      <Description>SUSE Bug 1227828</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227830</URL>
      <Description>SUSE Bug 1227830</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227836</URL>
      <Description>SUSE Bug 1227836</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227849</URL>
      <Description>SUSE Bug 1227849</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227865</URL>
      <Description>SUSE Bug 1227865</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227866</URL>
      <Description>SUSE Bug 1227866</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227884</URL>
      <Description>SUSE Bug 1227884</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227886</URL>
      <Description>SUSE Bug 1227886</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227891</URL>
      <Description>SUSE Bug 1227891</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227913</URL>
      <Description>SUSE Bug 1227913</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227924</URL>
      <Description>SUSE Bug 1227924</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227928</URL>
      <Description>SUSE Bug 1227928</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227929</URL>
      <Description>SUSE Bug 1227929</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227936</URL>
      <Description>SUSE Bug 1227936</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227957</URL>
      <Description>SUSE Bug 1227957</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227968</URL>
      <Description>SUSE Bug 1227968</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227969</URL>
      <Description>SUSE Bug 1227969</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227975</URL>
      <Description>SUSE Bug 1227975</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227985</URL>
      <Description>SUSE Bug 1227985</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227989</URL>
      <Description>SUSE Bug 1227989</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228003</URL>
      <Description>SUSE Bug 1228003</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228005</URL>
      <Description>SUSE Bug 1228005</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228008</URL>
      <Description>SUSE Bug 1228008</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228013</URL>
      <Description>SUSE Bug 1228013</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228025</URL>
      <Description>SUSE Bug 1228025</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228030</URL>
      <Description>SUSE Bug 1228030</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228037</URL>
      <Description>SUSE Bug 1228037</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228045</URL>
      <Description>SUSE Bug 1228045</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228054</URL>
      <Description>SUSE Bug 1228054</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228055</URL>
      <Description>SUSE Bug 1228055</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228063</URL>
      <Description>SUSE Bug 1228063</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228071</URL>
      <Description>SUSE Bug 1228071</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228235</URL>
      <Description>SUSE Bug 1228235</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228237</URL>
      <Description>SUSE Bug 1228237</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228327</URL>
      <Description>SUSE Bug 1228327</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228328</URL>
      <Description>SUSE Bug 1228328</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228408</URL>
      <Description>SUSE Bug 1228408</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228409</URL>
      <Description>SUSE Bug 1228409</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228410</URL>
      <Description>SUSE Bug 1228410</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228470</URL>
      <Description>SUSE Bug 1228470</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228530</URL>
      <Description>SUSE Bug 1228530</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228561</URL>
      <Description>SUSE Bug 1228561</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228565</URL>
      <Description>SUSE Bug 1228565</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228567</URL>
      <Description>SUSE Bug 1228567</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228580</URL>
      <Description>SUSE Bug 1228580</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228581</URL>
      <Description>SUSE Bug 1228581</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228584</URL>
      <Description>SUSE Bug 1228584</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228588</URL>
      <Description>SUSE Bug 1228588</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228599</URL>
      <Description>SUSE Bug 1228599</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228617</URL>
      <Description>SUSE Bug 1228617</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228625</URL>
      <Description>SUSE Bug 1228625</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228626</URL>
      <Description>SUSE Bug 1228626</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228633</URL>
      <Description>SUSE Bug 1228633</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228640</URL>
      <Description>SUSE Bug 1228640</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228649</URL>
      <Description>SUSE Bug 1228649</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228655</URL>
      <Description>SUSE Bug 1228655</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228658</URL>
      <Description>SUSE Bug 1228658</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228662</URL>
      <Description>SUSE Bug 1228662</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228680</URL>
      <Description>SUSE Bug 1228680</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228705</URL>
      <Description>SUSE Bug 1228705</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228723</URL>
      <Description>SUSE Bug 1228723</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228726</URL>
      <Description>SUSE Bug 1228726</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228743</URL>
      <Description>SUSE Bug 1228743</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228850</URL>
      <Description>SUSE Bug 1228850</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-26558/</URL>
      <Description>SUSE CVE CVE-2020-26558 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-0129/</URL>
      <Description>SUSE CVE CVE-2021-0129 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47145/</URL>
      <Description>SUSE CVE CVE-2021-47145 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47191/</URL>
      <Description>SUSE CVE CVE-2021-47191 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47194/</URL>
      <Description>SUSE CVE CVE-2021-47194 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47197/</URL>
      <Description>SUSE CVE CVE-2021-47197 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47201/</URL>
      <Description>SUSE CVE CVE-2021-47201 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47219/</URL>
      <Description>SUSE CVE CVE-2021-47219 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47275/</URL>
      <Description>SUSE CVE CVE-2021-47275 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47295/</URL>
      <Description>SUSE CVE CVE-2021-47295 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47388/</URL>
      <Description>SUSE CVE CVE-2021-47388 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47395/</URL>
      <Description>SUSE CVE CVE-2021-47395 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47399/</URL>
      <Description>SUSE CVE CVE-2021-47399 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47403/</URL>
      <Description>SUSE CVE CVE-2021-47403 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47405/</URL>
      <Description>SUSE CVE CVE-2021-47405 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47438/</URL>
      <Description>SUSE CVE CVE-2021-47438 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47441/</URL>
      <Description>SUSE CVE CVE-2021-47441 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47468/</URL>
      <Description>SUSE CVE CVE-2021-47468 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47498/</URL>
      <Description>SUSE CVE CVE-2021-47498 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47501/</URL>
      <Description>SUSE CVE CVE-2021-47501 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47516/</URL>
      <Description>SUSE CVE CVE-2021-47516 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47520/</URL>
      <Description>SUSE CVE CVE-2021-47520 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47542/</URL>
      <Description>SUSE CVE CVE-2021-47542 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47547/</URL>
      <Description>SUSE CVE CVE-2021-47547 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47559/</URL>
      <Description>SUSE CVE CVE-2021-47559 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47580/</URL>
      <Description>SUSE CVE CVE-2021-47580 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47582/</URL>
      <Description>SUSE CVE CVE-2021-47582 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47588/</URL>
      <Description>SUSE CVE CVE-2021-47588 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47597/</URL>
      <Description>SUSE CVE CVE-2021-47597 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47599/</URL>
      <Description>SUSE CVE CVE-2021-47599 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47606/</URL>
      <Description>SUSE CVE CVE-2021-47606 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47619/</URL>
      <Description>SUSE CVE CVE-2021-47619 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-20368/</URL>
      <Description>SUSE CVE CVE-2022-20368 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-28748/</URL>
      <Description>SUSE CVE CVE-2022-28748 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2964/</URL>
      <Description>SUSE CVE CVE-2022-2964 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48775/</URL>
      <Description>SUSE CVE CVE-2022-48775 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48792/</URL>
      <Description>SUSE CVE CVE-2022-48792 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48794/</URL>
      <Description>SUSE CVE CVE-2022-48794 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48804/</URL>
      <Description>SUSE CVE CVE-2022-48804 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48805/</URL>
      <Description>SUSE CVE CVE-2022-48805 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48810/</URL>
      <Description>SUSE CVE CVE-2022-48810 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48811/</URL>
      <Description>SUSE CVE CVE-2022-48811 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48823/</URL>
      <Description>SUSE CVE CVE-2022-48823 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48826/</URL>
      <Description>SUSE CVE CVE-2022-48826 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48827/</URL>
      <Description>SUSE CVE CVE-2022-48827 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48828/</URL>
      <Description>SUSE CVE CVE-2022-48828 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48829/</URL>
      <Description>SUSE CVE CVE-2022-48829 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48836/</URL>
      <Description>SUSE CVE CVE-2022-48836 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48839/</URL>
      <Description>SUSE CVE CVE-2022-48839 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48850/</URL>
      <Description>SUSE CVE CVE-2022-48850 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48855/</URL>
      <Description>SUSE CVE CVE-2022-48855 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48857/</URL>
      <Description>SUSE CVE CVE-2022-48857 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48860/</URL>
      <Description>SUSE CVE CVE-2022-48860 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48863/</URL>
      <Description>SUSE CVE CVE-2022-48863 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-4244/</URL>
      <Description>SUSE CVE CVE-2023-4244 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52435/</URL>
      <Description>SUSE CVE CVE-2023-52435 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52507/</URL>
      <Description>SUSE CVE CVE-2023-52507 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52594/</URL>
      <Description>SUSE CVE CVE-2023-52594 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52612/</URL>
      <Description>SUSE CVE CVE-2023-52612 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52615/</URL>
      <Description>SUSE CVE CVE-2023-52615 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52619/</URL>
      <Description>SUSE CVE CVE-2023-52619 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52623/</URL>
      <Description>SUSE CVE CVE-2023-52623 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52669/</URL>
      <Description>SUSE CVE CVE-2023-52669 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52683/</URL>
      <Description>SUSE CVE CVE-2023-52683 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52693/</URL>
      <Description>SUSE CVE CVE-2023-52693 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52743/</URL>
      <Description>SUSE CVE CVE-2023-52743 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52753/</URL>
      <Description>SUSE CVE CVE-2023-52753 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52817/</URL>
      <Description>SUSE CVE CVE-2023-52817 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52818/</URL>
      <Description>SUSE CVE CVE-2023-52818 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52819/</URL>
      <Description>SUSE CVE CVE-2023-52819 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52885/</URL>
      <Description>SUSE CVE CVE-2023-52885 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26615/</URL>
      <Description>SUSE CVE CVE-2024-26615 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26635/</URL>
      <Description>SUSE CVE CVE-2024-26635 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26636/</URL>
      <Description>SUSE CVE CVE-2024-26636 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26659/</URL>
      <Description>SUSE CVE CVE-2024-26659 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26663/</URL>
      <Description>SUSE CVE CVE-2024-26663 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26735/</URL>
      <Description>SUSE CVE CVE-2024-26735 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26830/</URL>
      <Description>SUSE CVE CVE-2024-26830 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26863/</URL>
      <Description>SUSE CVE CVE-2024-26863 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26880/</URL>
      <Description>SUSE CVE CVE-2024-26880 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26920/</URL>
      <Description>SUSE CVE CVE-2024-26920 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26924/</URL>
      <Description>SUSE CVE CVE-2024-26924 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-27019/</URL>
      <Description>SUSE CVE CVE-2024-27019 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-27020/</URL>
      <Description>SUSE CVE CVE-2024-27020 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-27025/</URL>
      <Description>SUSE CVE CVE-2024-27025 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-27437/</URL>
      <Description>SUSE CVE CVE-2024-27437 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35805/</URL>
      <Description>SUSE CVE CVE-2024-35805 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35806/</URL>
      <Description>SUSE CVE CVE-2024-35806 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35819/</URL>
      <Description>SUSE CVE CVE-2024-35819 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35828/</URL>
      <Description>SUSE CVE CVE-2024-35828 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35837/</URL>
      <Description>SUSE CVE CVE-2024-35837 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35887/</URL>
      <Description>SUSE CVE CVE-2024-35887 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35893/</URL>
      <Description>SUSE CVE CVE-2024-35893 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35934/</URL>
      <Description>SUSE CVE CVE-2024-35934 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35947/</URL>
      <Description>SUSE CVE CVE-2024-35947 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35949/</URL>
      <Description>SUSE CVE CVE-2024-35949 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35966/</URL>
      <Description>SUSE CVE CVE-2024-35966 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35967/</URL>
      <Description>SUSE CVE CVE-2024-35967 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35978/</URL>
      <Description>SUSE CVE CVE-2024-35978 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35995/</URL>
      <Description>SUSE CVE CVE-2024-35995 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36004/</URL>
      <Description>SUSE CVE CVE-2024-36004 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36014/</URL>
      <Description>SUSE CVE CVE-2024-36014 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36288/</URL>
      <Description>SUSE CVE CVE-2024-36288 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36592/</URL>
      <Description>SUSE CVE CVE-2024-36592 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36901/</URL>
      <Description>SUSE CVE CVE-2024-36901 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36902/</URL>
      <Description>SUSE CVE CVE-2024-36902 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36919/</URL>
      <Description>SUSE CVE CVE-2024-36919 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36924/</URL>
      <Description>SUSE CVE CVE-2024-36924 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36939/</URL>
      <Description>SUSE CVE CVE-2024-36939 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36941/</URL>
      <Description>SUSE CVE CVE-2024-36941 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36952/</URL>
      <Description>SUSE CVE CVE-2024-36952 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38558/</URL>
      <Description>SUSE CVE CVE-2024-38558 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38560/</URL>
      <Description>SUSE CVE CVE-2024-38560 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38598/</URL>
      <Description>SUSE CVE CVE-2024-38598 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38619/</URL>
      <Description>SUSE CVE CVE-2024-38619 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38630/</URL>
      <Description>SUSE CVE CVE-2024-38630 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-39301/</URL>
      <Description>SUSE CVE CVE-2024-39301 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-39475/</URL>
      <Description>SUSE CVE CVE-2024-39475 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-39487/</URL>
      <Description>SUSE CVE CVE-2024-39487 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-39488/</URL>
      <Description>SUSE CVE CVE-2024-39488 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-39490/</URL>
      <Description>SUSE CVE CVE-2024-39490 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-39494/</URL>
      <Description>SUSE CVE CVE-2024-39494 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-39499/</URL>
      <Description>SUSE CVE CVE-2024-39499 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-39501/</URL>
      <Description>SUSE CVE CVE-2024-39501 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-39506/</URL>
      <Description>SUSE CVE CVE-2024-39506 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-39507/</URL>
      <Description>SUSE CVE CVE-2024-39507 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-39509/</URL>
      <Description>SUSE CVE CVE-2024-39509 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-40901/</URL>
      <Description>SUSE CVE CVE-2024-40901 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-40904/</URL>
      <Description>SUSE CVE CVE-2024-40904 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-40912/</URL>
      <Description>SUSE CVE CVE-2024-40912 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-40923/</URL>
      <Description>SUSE CVE CVE-2024-40923 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-40929/</URL>
      <Description>SUSE CVE CVE-2024-40929 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-40932/</URL>
      <Description>SUSE CVE CVE-2024-40932 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-40937/</URL>
      <Description>SUSE CVE CVE-2024-40937 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-40941/</URL>
      <Description>SUSE CVE CVE-2024-40941 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-40942/</URL>
      <Description>SUSE CVE CVE-2024-40942 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-40943/</URL>
      <Description>SUSE CVE CVE-2024-40943 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-40953/</URL>
      <Description>SUSE CVE CVE-2024-40953 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-40959/</URL>
      <Description>SUSE CVE CVE-2024-40959 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-40966/</URL>
      <Description>SUSE CVE CVE-2024-40966 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-40967/</URL>
      <Description>SUSE CVE CVE-2024-40967 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-40978/</URL>
      <Description>SUSE CVE CVE-2024-40978 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-40982/</URL>
      <Description>SUSE CVE CVE-2024-40982 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-40987/</URL>
      <Description>SUSE CVE CVE-2024-40987 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-40988/</URL>
      <Description>SUSE CVE CVE-2024-40988 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-40990/</URL>
      <Description>SUSE CVE CVE-2024-40990 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-40995/</URL>
      <Description>SUSE CVE CVE-2024-40995 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-40998/</URL>
      <Description>SUSE CVE CVE-2024-40998 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-40999/</URL>
      <Description>SUSE CVE CVE-2024-40999 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-41014/</URL>
      <Description>SUSE CVE CVE-2024-41014 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-41015/</URL>
      <Description>SUSE CVE CVE-2024-41015 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-41016/</URL>
      <Description>SUSE CVE CVE-2024-41016 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-41044/</URL>
      <Description>SUSE CVE CVE-2024-41044 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-41048/</URL>
      <Description>SUSE CVE CVE-2024-41048 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-41059/</URL>
      <Description>SUSE CVE CVE-2024-41059 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-41060/</URL>
      <Description>SUSE CVE CVE-2024-41060 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-41063/</URL>
      <Description>SUSE CVE CVE-2024-41063 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-41064/</URL>
      <Description>SUSE CVE CVE-2024-41064 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-41066/</URL>
      <Description>SUSE CVE CVE-2024-41066 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-41070/</URL>
      <Description>SUSE CVE CVE-2024-41070 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-41071/</URL>
      <Description>SUSE CVE CVE-2024-41071 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-41072/</URL>
      <Description>SUSE CVE CVE-2024-41072 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-41076/</URL>
      <Description>SUSE CVE CVE-2024-41076 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-41078/</URL>
      <Description>SUSE CVE CVE-2024-41078 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-41081/</URL>
      <Description>SUSE CVE CVE-2024-41081 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-41089/</URL>
      <Description>SUSE CVE CVE-2024-41089 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-41090/</URL>
      <Description>SUSE CVE CVE-2024-41090 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-41091/</URL>
      <Description>SUSE CVE CVE-2024-41091 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-41095/</URL>
      <Description>SUSE CVE CVE-2024-41095 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-42070/</URL>
      <Description>SUSE CVE CVE-2024-42070 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-42093/</URL>
      <Description>SUSE CVE CVE-2024-42093 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-42096/</URL>
      <Description>SUSE CVE CVE-2024-42096 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-42119/</URL>
      <Description>SUSE CVE CVE-2024-42119 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-42120/</URL>
      <Description>SUSE CVE CVE-2024-42120 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-42124/</URL>
      <Description>SUSE CVE CVE-2024-42124 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-42145/</URL>
      <Description>SUSE CVE CVE-2024-42145 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-42223/</URL>
      <Description>SUSE CVE CVE-2024-42223 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-42224/</URL>
      <Description>SUSE CVE CVE-2024-42224 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Image SLES12-SP5-Azure-HPC-On-Demand">
      <Branch Type="Product Name" Name="Image SLES12-SP5-Azure-HPC-On-Demand">
        <FullProductName ProductID="Image SLES12-SP5-Azure-HPC-On-Demand">Image SLES12-SP5-Azure-HPC-On-Demand</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-Azure-Standard-On-Demand">
      <Branch Type="Product Name" Name="Image SLES12-SP5-Azure-Standard-On-Demand">
        <FullProductName ProductID="Image SLES12-SP5-Azure-Standard-On-Demand">Image SLES12-SP5-Azure-Standard-On-Demand</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5" CPE="cpe:/o:suse:sles:12:sp5">SUSE Linux Enterprise Server 12 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5" CPE="cpe:/o:suse:sles_sap:12:sp5">SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-azure-4.12.14-16.194.1">
      <FullProductName ProductID="kernel-azure-4.12.14-16.194.1">kernel-azure-4.12.14-16.194.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cluster-md-kmp-azure-4.12.14-16.194.1">
      <FullProductName ProductID="cluster-md-kmp-azure-4.12.14-16.194.1">cluster-md-kmp-azure-4.12.14-16.194.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dlm-kmp-azure-4.12.14-16.194.1">
      <FullProductName ProductID="dlm-kmp-azure-4.12.14-16.194.1">dlm-kmp-azure-4.12.14-16.194.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gfs2-kmp-azure-4.12.14-16.194.1">
      <FullProductName ProductID="gfs2-kmp-azure-4.12.14-16.194.1">gfs2-kmp-azure-4.12.14-16.194.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-azure-base-4.12.14-16.194.1">
      <FullProductName ProductID="kernel-azure-base-4.12.14-16.194.1">kernel-azure-base-4.12.14-16.194.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-azure-devel-4.12.14-16.194.1">
      <FullProductName ProductID="kernel-azure-devel-4.12.14-16.194.1">kernel-azure-devel-4.12.14-16.194.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-azure-extra-4.12.14-16.194.1">
      <FullProductName ProductID="kernel-azure-extra-4.12.14-16.194.1">kernel-azure-extra-4.12.14-16.194.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-azure-kgraft-devel-4.12.14-16.194.1">
      <FullProductName ProductID="kernel-azure-kgraft-devel-4.12.14-16.194.1">kernel-azure-kgraft-devel-4.12.14-16.194.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-azure-4.12.14-16.194.1">
      <FullProductName ProductID="kernel-devel-azure-4.12.14-16.194.1">kernel-devel-azure-4.12.14-16.194.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-azure-4.12.14-16.194.1">
      <FullProductName ProductID="kernel-source-azure-4.12.14-16.194.1">kernel-source-azure-4.12.14-16.194.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-azure-4.12.14-16.194.1">
      <FullProductName ProductID="kernel-syms-azure-4.12.14-16.194.1">kernel-syms-azure-4.12.14-16.194.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kselftests-kmp-azure-4.12.14-16.194.1">
      <FullProductName ProductID="kselftests-kmp-azure-4.12.14-16.194.1">kselftests-kmp-azure-4.12.14-16.194.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ocfs2-kmp-azure-4.12.14-16.194.1">
      <FullProductName ProductID="ocfs2-kmp-azure-4.12.14-16.194.1">ocfs2-kmp-azure-4.12.14-16.194.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-azure-4.12.14-16.194.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-HPC-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1">kernel-azure-4.12.14-16.194.1 as a component of Image SLES12-SP5-Azure-HPC-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-4.12.14-16.194.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-Standard-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1">kernel-azure-4.12.14-16.194.1 as a component of Image SLES12-SP5-Azure-Standard-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-4.12.14-16.194.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1">kernel-azure-4.12.14-16.194.1 as a component of SUSE Linux Enterprise Server 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-base-4.12.14-16.194.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1">kernel-azure-base-4.12.14-16.194.1 as a component of SUSE Linux Enterprise Server 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-devel-4.12.14-16.194.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1">kernel-azure-devel-4.12.14-16.194.1 as a component of SUSE Linux Enterprise Server 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-azure-4.12.14-16.194.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1">kernel-devel-azure-4.12.14-16.194.1 as a component of SUSE Linux Enterprise Server 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-azure-4.12.14-16.194.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1">kernel-source-azure-4.12.14-16.194.1 as a component of SUSE Linux Enterprise Server 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-azure-4.12.14-16.194.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1">kernel-syms-azure-4.12.14-16.194.1 as a component of SUSE Linux Enterprise Server 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-4.12.14-16.194.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1">kernel-azure-4.12.14-16.194.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-base-4.12.14-16.194.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1">kernel-azure-base-4.12.14-16.194.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-devel-4.12.14-16.194.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1">kernel-azure-devel-4.12.14-16.194.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-azure-4.12.14-16.194.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1">kernel-devel-azure-4.12.14-16.194.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-azure-4.12.14-16.194.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1">kernel-source-azure-4.12.14-16.194.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-azure-4.12.14-16.194.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1">kernel-syms-azure-4.12.14-16.194.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.</Note>
    </Notes>
    <CVE>CVE-2020-26558</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-26558.html</URL>
        <Description>CVE-2020-26558</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179610</URL>
        <Description>SUSE Bug 1179610</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1186463</URL>
        <Description>SUSE Bug 1186463</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.</Note>
    </Notes>
    <CVE>CVE-2021-0129</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.7</BaseScore>
        <Vector>AV:A/AC:L/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-0129.html</URL>
        <Description>CVE-2021-0129</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1186463</URL>
        <Description>SUSE Bug 1186463</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

btrfs: do not BUG_ON in link_to_fixup_dir

While doing error injection testing I got the following panic

  kernel BUG at fs/btrfs/tree-log.c:1862!
  invalid opcode: 0000 [#1] SMP NOPTI
  CPU: 1 PID: 7836 Comm: mount Not tainted 5.13.0-rc1+ #305
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.13.0-2.fc32 04/01/2014
  RIP: 0010:link_to_fixup_dir+0xd5/0xe0
  RSP: 0018:ffffb5800180fa30 EFLAGS: 00010216
  RAX: fffffffffffffffb RBX: 00000000fffffffb RCX: ffff8f595287faf0
  RDX: ffffb5800180fa37 RSI: ffff8f5954978800 RDI: 0000000000000000
  RBP: ffff8f5953af9450 R08: 0000000000000019 R09: 0000000000000001
  R10: 000151f408682970 R11: 0000000120021001 R12: ffff8f5954978800
  R13: ffff8f595287faf0 R14: ffff8f5953c77dd0 R15: 0000000000000065
  FS:  00007fc5284c8c40(0000) GS:ffff8f59bbd00000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007fc5287f47c0 CR3: 000000011275e002 CR4: 0000000000370ee0
  Call Trace:
   replay_one_buffer+0x409/0x470
   ? btree_read_extent_buffer_pages+0xd0/0x110
   walk_up_log_tree+0x157/0x1e0
   walk_log_tree+0xa6/0x1d0
   btrfs_recover_log_trees+0x1da/0x360
   ? replay_one_extent+0x7b0/0x7b0
   open_ctree+0x1486/0x1720
   btrfs_mount_root.cold+0x12/0xea
   ? __kmalloc_track_caller+0x12f/0x240
   legacy_get_tree+0x24/0x40
   vfs_get_tree+0x22/0xb0
   vfs_kern_mount.part.0+0x71/0xb0
   btrfs_mount+0x10d/0x380
   ? vfs_parse_fs_string+0x4d/0x90
   legacy_get_tree+0x24/0x40
   vfs_get_tree+0x22/0xb0
   path_mount+0x433/0xa10
   __x64_sys_mount+0xe3/0x120
   do_syscall_64+0x3d/0x80
   entry_SYSCALL_64_after_hwframe+0x44/0xae

We can get -EIO or any number of legitimate errors from
btrfs_search_slot(), panicing here is not the appropriate response.  The
error path for this code handles errors properly, simply return the
error.</Note>
    </Notes>
    <CVE>CVE-2021-47145</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47145.html</URL>
        <Description>CVE-2021-47145</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222005</URL>
        <Description>SUSE Bug 1222005</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: scsi_debug: Fix out-of-bound read in resp_readcap16()

The following warning was observed running syzkaller:

[ 3813.830724] sg_write: data in/out 65466/242 bytes for SCSI command 0x9e-- guessing data in;
[ 3813.830724]    program syz-executor not setting count and/or reply_len properly
[ 3813.836956] ==================================================================
[ 3813.839465] BUG: KASAN: stack-out-of-bounds in sg_copy_buffer+0x157/0x1e0
[ 3813.841773] Read of size 4096 at addr ffff8883cf80f540 by task syz-executor/1549
[ 3813.846612] Call Trace:
[ 3813.846995]  dump_stack+0x108/0x15f
[ 3813.847524]  print_address_description+0xa5/0x372
[ 3813.848243]  kasan_report.cold+0x236/0x2a8
[ 3813.849439]  check_memory_region+0x240/0x270
[ 3813.850094]  memcpy+0x30/0x80
[ 3813.850553]  sg_copy_buffer+0x157/0x1e0
[ 3813.853032]  sg_copy_from_buffer+0x13/0x20
[ 3813.853660]  fill_from_dev_buffer+0x135/0x370
[ 3813.854329]  resp_readcap16+0x1ac/0x280
[ 3813.856917]  schedule_resp+0x41f/0x1630
[ 3813.858203]  scsi_debug_queuecommand+0xb32/0x17e0
[ 3813.862699]  scsi_dispatch_cmd+0x330/0x950
[ 3813.863329]  scsi_request_fn+0xd8e/0x1710
[ 3813.863946]  __blk_run_queue+0x10b/0x230
[ 3813.864544]  blk_execute_rq_nowait+0x1d8/0x400
[ 3813.865220]  sg_common_write.isra.0+0xe61/0x2420
[ 3813.871637]  sg_write+0x6c8/0xef0
[ 3813.878853]  __vfs_write+0xe4/0x800
[ 3813.883487]  vfs_write+0x17b/0x530
[ 3813.884008]  ksys_write+0x103/0x270
[ 3813.886268]  __x64_sys_write+0x77/0xc0
[ 3813.886841]  do_syscall_64+0x106/0x360
[ 3813.887415]  entry_SYSCALL_64_after_hwframe+0x44/0xa9

This issue can be reproduced with the following syzkaller log:

r0 = openat(0xffffffffffffff9c, &amp;(0x7f0000000040)='./file0\x00', 0x26e1, 0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &amp;(0x7f0000000000)='fd/3\x00')
open_by_handle_at(r1, &amp;(0x7f00000003c0)=ANY=[@ANYRESHEX], 0x602000)
r2 = syz_open_dev$sg(&amp;(0x7f0000000000), 0x0, 0x40782)
write$binfmt_aout(r2, &amp;(0x7f0000000340)=ANY=[@ANYBLOB="00000000deff000000000000000000000000000000000000000000000000000047f007af9e107a41ec395f1bded7be24277a1501ff6196a83366f4e6362bc0ff2b247f68a972989b094b2da4fb3607fcf611a22dd04310d28c75039d"], 0x126)

In resp_readcap16() we get "int alloc_len" value -1104926854, and then pass
the huge arr_len to fill_from_dev_buffer(), but arr is only 32 bytes. This
leads to OOB in sg_copy_buffer().

To solve this issue, define alloc_len as u32.</Note>
    </Notes>
    <CVE>CVE-2021-47191</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47191.html</URL>
        <Description>CVE-2021-47191</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222866</URL>
        <Description>SUSE Bug 1222866</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

cfg80211: call cfg80211_stop_ap when switch from P2P_GO type

If the userspace tools switch from NL80211_IFTYPE_P2P_GO to
NL80211_IFTYPE_ADHOC via send_msg(NL80211_CMD_SET_INTERFACE), it
does not call the cleanup cfg80211_stop_ap(), this leads to the
initialization of in-use data. For example, this path re-init the
sdata-&gt;assigned_chanctx_list while it is still an element of
assigned_vifs list, and makes that linked list corrupt.</Note>
    </Notes>
    <CVE>CVE-2021-47194</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47194.html</URL>
        <Description>CVE-2021-47194</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222829</URL>
        <Description>SUSE Bug 1222829</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: nullify cq-&gt;dbg pointer in mlx5_debug_cq_remove()

Prior to this patch in case mlx5_core_destroy_cq() failed it proceeds
to rest of destroy operations. mlx5_core_destroy_cq() could be called again
by user and cause additional call of mlx5_debug_cq_remove().
cq-&gt;dbg was not nullify in previous call and cause the crash.

Fix it by nullify cq-&gt;dbg pointer after removal.

Also proceed to destroy operations only if FW return 0
for MLX5_CMD_OP_DESTROY_CQ command.

general protection fault, probably for non-canonical address 0x2000300004058: 0000 [#1] SMP PTI
CPU: 5 PID: 1228 Comm: python Not tainted 5.15.0-rc5_for_upstream_min_debug_2021_10_14_11_06 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
RIP: 0010:lockref_get+0x1/0x60
Code: 5d e9 53 ff ff ff 48 8d 7f 70 e8 0a 2e 48 00 c7 85 d0 00 00 00 02
00 00 00 c6 45 70 00 fb 5d c3 c3 cc cc cc cc cc cc cc cc 53 &lt;48&gt; 8b 17
48 89 fb 85 d2 75 3d 48 89 d0 bf 64 00 00 00 48 89 c1 48
RSP: 0018:ffff888137dd7a38 EFLAGS: 00010206
RAX: 0000000000000000 RBX: ffff888107d5f458 RCX: 00000000fffffffe
RDX: 000000000002c2b0 RSI: ffffffff8155e2e0 RDI: 0002000300004058
RBP: ffff888137dd7a88 R08: 0002000300004058 R09: ffff8881144a9f88
R10: 0000000000000000 R11: 0000000000000000 R12: ffff8881141d4000
R13: ffff888137dd7c68 R14: ffff888137dd7d58 R15: ffff888137dd7cc0
FS:  00007f4644f2a4c0(0000) GS:ffff8887a2d40000(0000)
knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055b4500f4380 CR3: 0000000114f7a003 CR4: 0000000000170ea0
Call Trace:
  simple_recursive_removal+0x33/0x2e0
  ? debugfs_remove+0x60/0x60
  debugfs_remove+0x40/0x60
  mlx5_debug_cq_remove+0x32/0x70 [mlx5_core]
  mlx5_core_destroy_cq+0x41/0x1d0 [mlx5_core]
  devx_obj_cleanup+0x151/0x330 [mlx5_ib]
  ? __pollwait+0xd0/0xd0
  ? xas_load+0x5/0x70
  ? xa_load+0x62/0xa0
  destroy_hw_idr_uobject+0x20/0x80 [ib_uverbs]
  uverbs_destroy_uobject+0x3b/0x360 [ib_uverbs]
  uobj_destroy+0x54/0xa0 [ib_uverbs]
  ib_uverbs_cmd_verbs+0xaf2/0x1160 [ib_uverbs]
  ? uverbs_finalize_object+0xd0/0xd0 [ib_uverbs]
  ib_uverbs_ioctl+0xc4/0x1b0 [ib_uverbs]
  __x64_sys_ioctl+0x3e4/0x8e0</Note>
    </Notes>
    <CVE>CVE-2021-47197</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47197.html</URL>
        <Description>CVE-2021-47197</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222776</URL>
        <Description>SUSE Bug 1222776</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

iavf: free q_vectors before queues in iavf_disable_vf

iavf_free_queues() clears adapter-&gt;num_active_queues, which
iavf_free_q_vectors() relies on, so swap the order of these two function
calls in iavf_disable_vf(). This resolves a panic encountered when the
interface is disabled and then later brought up again after PF
communication is restored.</Note>
    </Notes>
    <CVE>CVE-2021-47201</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47201.html</URL>
        <Description>CVE-2021-47201</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222792</URL>
        <Description>SUSE Bug 1222792</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs()

The following issue was observed running syzkaller:

BUG: KASAN: slab-out-of-bounds in memcpy include/linux/string.h:377 [inline]
BUG: KASAN: slab-out-of-bounds in sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831
Read of size 2132 at addr ffff8880aea95dc8 by task syz-executor.0/9815

CPU: 0 PID: 9815 Comm: syz-executor.0 Not tainted 4.19.202-00874-gfc0fe04215a9 #2
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0xe4/0x14a lib/dump_stack.c:118
 print_address_description+0x73/0x280 mm/kasan/report.c:253
 kasan_report_error mm/kasan/report.c:352 [inline]
 kasan_report+0x272/0x370 mm/kasan/report.c:410
 memcpy+0x1f/0x50 mm/kasan/kasan.c:302
 memcpy include/linux/string.h:377 [inline]
 sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831
 fill_from_dev_buffer+0x14f/0x340 drivers/scsi/scsi_debug.c:1021
 resp_report_tgtpgs+0x5aa/0x770 drivers/scsi/scsi_debug.c:1772
 schedule_resp+0x464/0x12f0 drivers/scsi/scsi_debug.c:4429
 scsi_debug_queuecommand+0x467/0x1390 drivers/scsi/scsi_debug.c:5835
 scsi_dispatch_cmd+0x3fc/0x9b0 drivers/scsi/scsi_lib.c:1896
 scsi_request_fn+0x1042/0x1810 drivers/scsi/scsi_lib.c:2034
 __blk_run_queue_uncond block/blk-core.c:464 [inline]
 __blk_run_queue+0x1a4/0x380 block/blk-core.c:484
 blk_execute_rq_nowait+0x1c2/0x2d0 block/blk-exec.c:78
 sg_common_write.isra.19+0xd74/0x1dc0 drivers/scsi/sg.c:847
 sg_write.part.23+0x6e0/0xd00 drivers/scsi/sg.c:716
 sg_write+0x64/0xa0 drivers/scsi/sg.c:622
 __vfs_write+0xed/0x690 fs/read_write.c:485
kill_bdev:block_device:00000000e138492c
 vfs_write+0x184/0x4c0 fs/read_write.c:549
 ksys_write+0x107/0x240 fs/read_write.c:599
 do_syscall_64+0xc2/0x560 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe

We get 'alen' from command its type is int. If userspace passes a large
length we will get a negative 'alen'.

Switch n, alen, and rlen to u32.</Note>
    </Notes>
    <CVE>CVE-2021-47219</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47219.html</URL>
        <Description>CVE-2021-47219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222824</URL>
        <Description>SUSE Bug 1222824</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bcache: avoid oversized read request in cache missing code path

In the cache missing code path of cached device, if a proper location
from the internal B+ tree is matched for a cache miss range, function
cached_dev_cache_miss() will be called in cache_lookup_fn() in the
following code block,
[code block 1]
  526         unsigned int sectors = KEY_INODE(k) == s-&gt;iop.inode
  527                 ? min_t(uint64_t, INT_MAX,
  528                         KEY_START(k) - bio-&gt;bi_iter.bi_sector)
  529                 : INT_MAX;
  530         int ret = s-&gt;d-&gt;cache_miss(b, s, bio, sectors);

Here s-&gt;d-&gt;cache_miss() is the call backfunction pointer initialized as
cached_dev_cache_miss(), the last parameter 'sectors' is an important
hint to calculate the size of read request to backing device of the
missing cache data.

Current calculation in above code block may generate oversized value of
'sectors', which consequently may trigger 2 different potential kernel
panics by BUG() or BUG_ON() as listed below,

1) BUG_ON() inside bch_btree_insert_key(),
[code block 2]
   886         BUG_ON(b-&gt;ops-&gt;is_extents &amp;&amp; !KEY_SIZE(k));
2) BUG() inside biovec_slab(),
[code block 3]
   51         default:
   52                 BUG();
   53                 return NULL;

All the above panics are original from cached_dev_cache_miss() by the
oversized parameter 'sectors'.

Inside cached_dev_cache_miss(), parameter 'sectors' is used to calculate
the size of data read from backing device for the cache missing. This
size is stored in s-&gt;insert_bio_sectors by the following lines of code,
[code block 4]
  909    s-&gt;insert_bio_sectors = min(sectors, bio_sectors(bio) + reada);

Then the actual key inserting to the internal B+ tree is generated and
stored in s-&gt;iop.replace_key by the following lines of code,
[code block 5]
  911   s-&gt;iop.replace_key = KEY(s-&gt;iop.inode,
  912                    bio-&gt;bi_iter.bi_sector + s-&gt;insert_bio_sectors,
  913                    s-&gt;insert_bio_sectors);
The oversized parameter 'sectors' may trigger panic 1) by BUG_ON() from
the above code block.

And the bio sending to backing device for the missing data is allocated
with hint from s-&gt;insert_bio_sectors by the following lines of code,
[code block 6]
  926    cache_bio = bio_alloc_bioset(GFP_NOWAIT,
  927                 DIV_ROUND_UP(s-&gt;insert_bio_sectors, PAGE_SECTORS),
  928                 &amp;dc-&gt;disk.bio_split);
The oversized parameter 'sectors' may trigger panic 2) by BUG() from the
agove code block.

Now let me explain how the panics happen with the oversized 'sectors'.
In code block 5, replace_key is generated by macro KEY(). From the
definition of macro KEY(),
[code block 7]
  71 #define KEY(inode, offset, size)                                  \
  72 ((struct bkey) {                                                  \
  73      .high = (1ULL &lt;&lt; 63) | ((__u64) (size) &lt;&lt; 20) | (inode),     \
  74      .low = (offset)                                              \
  75 })

Here 'size' is 16bits width embedded in 64bits member 'high' of struct
bkey. But in code block 1, if "KEY_START(k) - bio-&gt;bi_iter.bi_sector" is
very probably to be larger than (1&lt;&lt;16) - 1, which makes the bkey size
calculation in code block 5 is overflowed. In one bug report the value
of parameter 'sectors' is 131072 (= 1 &lt;&lt; 17), the overflowed 'sectors'
results the overflowed s-&gt;insert_bio_sectors in code block 4, then makes
size field of s-&gt;iop.replace_key to be 0 in code block 5. Then the 0-
sized s-&gt;iop.replace_key is inserted into the internal B+ tree as cache
missing check key (a special key to detect and avoid a racing between
normal write request and cache missing read request) as,
[code block 8]
  915   ret = bch_btree_insert_check_key(b, &amp;s-&gt;op, &amp;s-&gt;iop.replace_key);

Then the 0-sized s-&gt;iop.replace_key as 3rd parameter triggers the bkey
size check BUG_ON() in code block 2, and causes the kernel panic 1).

Another ke
---truncated---</Note>
    </Notes>
    <CVE>CVE-2021-47275</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47275.html</URL>
        <Description>CVE-2021-47275</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224965</URL>
        <Description>SUSE Bug 1224965</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: sched: fix memory leak in tcindex_partial_destroy_work

Syzbot reported memory leak in tcindex_set_parms(). The problem was in
non-freed perfect hash in tcindex_partial_destroy_work().

In tcindex_set_parms() new tcindex_data is allocated and some fields from
old one are copied to new one, but not the perfect hash. Since
tcindex_partial_destroy_work() is the destroy function for old
tcindex_data, we need to free perfect hash to avoid memory leak.</Note>
    </Notes>
    <CVE>CVE-2021-47295</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47295.html</URL>
        <Description>CVE-2021-47295</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224975</URL>
        <Description>SUSE Bug 1224975</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mac80211: fix use-after-free in CCMP/GCMP RX

When PN checking is done in mac80211, for fragmentation we need
to copy the PN to the RX struct so we can later use it to do a
comparison, since commit bf30ca922a0c ("mac80211: check defrag
PN against current frame").

Unfortunately, in that commit I used the 'hdr' variable without
it being necessarily valid, so use-after-free could occur if it
was necessary to reallocate (parts of) the frame.

Fix this by reloading the variable after the code that results
in the reallocations, if any.

This fixes https://bugzilla.kernel.org/show_bug.cgi?id=214401.</Note>
    </Notes>
    <CVE>CVE-2021-47388</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47388.html</URL>
        <Description>CVE-2021-47388</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225214</URL>
        <Description>SUSE Bug 1225214</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap

Limit max values for vht mcs and nss in ieee80211_parse_tx_radiotap
routine in order to fix the following warning reported by syzbot:

WARNING: CPU: 0 PID: 10717 at include/net/mac80211.h:989 ieee80211_rate_set_vht include/net/mac80211.h:989 [inline]
WARNING: CPU: 0 PID: 10717 at include/net/mac80211.h:989 ieee80211_parse_tx_radiotap+0x101e/0x12d0 net/mac80211/tx.c:2244
Modules linked in:
CPU: 0 PID: 10717 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:ieee80211_rate_set_vht include/net/mac80211.h:989 [inline]
RIP: 0010:ieee80211_parse_tx_radiotap+0x101e/0x12d0 net/mac80211/tx.c:2244
RSP: 0018:ffffc9000186f3e8 EFLAGS: 00010216
RAX: 0000000000000618 RBX: ffff88804ef76500 RCX: ffffc900143a5000
RDX: 0000000000040000 RSI: ffffffff888f478e RDI: 0000000000000003
RBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000000100
R10: ffffffff888f46f9 R11: 0000000000000000 R12: 00000000fffffff8
R13: ffff88804ef7653c R14: 0000000000000001 R15: 0000000000000004
FS:  00007fbf5718f700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b2de23000 CR3: 000000006a671000 CR4: 00000000001506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
Call Trace:
 ieee80211_monitor_select_queue+0xa6/0x250 net/mac80211/iface.c:740
 netdev_core_pick_tx+0x169/0x2e0 net/core/dev.c:4089
 __dev_queue_xmit+0x6f9/0x3710 net/core/dev.c:4165
 __bpf_tx_skb net/core/filter.c:2114 [inline]
 __bpf_redirect_no_mac net/core/filter.c:2139 [inline]
 __bpf_redirect+0x5ba/0xd20 net/core/filter.c:2162
 ____bpf_clone_redirect net/core/filter.c:2429 [inline]
 bpf_clone_redirect+0x2ae/0x420 net/core/filter.c:2401
 bpf_prog_eeb6f53a69e5c6a2+0x59/0x234
 bpf_dispatcher_nop_func include/linux/bpf.h:717 [inline]
 __bpf_prog_run include/linux/filter.h:624 [inline]
 bpf_prog_run include/linux/filter.h:631 [inline]
 bpf_test_run+0x381/0xa30 net/bpf/test_run.c:119
 bpf_prog_test_run_skb+0xb84/0x1ee0 net/bpf/test_run.c:663
 bpf_prog_test_run kernel/bpf/syscall.c:3307 [inline]
 __sys_bpf+0x2137/0x5df0 kernel/bpf/syscall.c:4605
 __do_sys_bpf kernel/bpf/syscall.c:4691 [inline]
 __se_sys_bpf kernel/bpf/syscall.c:4689 [inline]
 __x64_sys_bpf+0x75/0xb0 kernel/bpf/syscall.c:4689
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x4665f9</Note>
    </Notes>
    <CVE>CVE-2021-47395</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47395.html</URL>
        <Description>CVE-2021-47395</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225326</URL>
        <Description>SUSE Bug 1225326</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup

The ixgbe driver currently generates a NULL pointer dereference with
some machine (online cpus &lt; 63). This is due to the fact that the
maximum value of num_xdp_queues is nr_cpu_ids. Code is in
"ixgbe_set_rss_queues"".

Here's how the problem repeats itself:
Some machine (online cpus &lt; 63), And user set num_queues to 63 through
ethtool. Code is in the "ixgbe_set_channels",
	adapter-&gt;ring_feature[RING_F_FDIR].limit = count;

It becomes 63.

When user use xdp, "ixgbe_set_rss_queues" will set queues num.
	adapter-&gt;num_rx_queues = rss_i;
	adapter-&gt;num_tx_queues = rss_i;
	adapter-&gt;num_xdp_queues = ixgbe_xdp_queues(adapter);

And rss_i's value is from
	f = &amp;adapter-&gt;ring_feature[RING_F_FDIR];
	rss_i = f-&gt;indices = f-&gt;limit;

So "num_rx_queues" &gt; "num_xdp_queues", when run to "ixgbe_xdp_setup",
	for (i = 0; i &lt; adapter-&gt;num_rx_queues; i++)
		if (adapter-&gt;xdp_ring[i]-&gt;xsk_umem)

It leads to panic.

Call trace:
[exception RIP: ixgbe_xdp+368]
RIP: ffffffffc02a76a0  RSP: ffff9fe16202f8d0  RFLAGS: 00010297
RAX: 0000000000000000  RBX: 0000000000000020  RCX: 0000000000000000
RDX: 0000000000000000  RSI: 000000000000001c  RDI: ffffffffa94ead90
RBP: ffff92f8f24c0c18   R8: 0000000000000000   R9: 0000000000000000
R10: ffff9fe16202f830  R11: 0000000000000000  R12: ffff92f8f24c0000
R13: ffff9fe16202fc01  R14: 000000000000000a  R15: ffffffffc02a7530
ORIG_RAX: ffffffffffffffff  CS: 0010  SS: 0018
 7 [ffff9fe16202f8f0] dev_xdp_install at ffffffffa89fbbcc
 8 [ffff9fe16202f920] dev_change_xdp_fd at ffffffffa8a08808
 9 [ffff9fe16202f960] do_setlink at ffffffffa8a20235
10 [ffff9fe16202fa88] rtnl_setlink at ffffffffa8a20384
11 [ffff9fe16202fc78] rtnetlink_rcv_msg at ffffffffa8a1a8dd
12 [ffff9fe16202fcf0] netlink_rcv_skb at ffffffffa8a717eb
13 [ffff9fe16202fd40] netlink_unicast at ffffffffa8a70f88
14 [ffff9fe16202fd80] netlink_sendmsg at ffffffffa8a71319
15 [ffff9fe16202fdf0] sock_sendmsg at ffffffffa89df290
16 [ffff9fe16202fe08] __sys_sendto at ffffffffa89e19c8
17 [ffff9fe16202ff30] __x64_sys_sendto at ffffffffa89e1a64
18 [ffff9fe16202ff38] do_syscall_64 at ffffffffa84042b9
19 [ffff9fe16202ff50] entry_SYSCALL_64_after_hwframe at ffffffffa8c0008c

So I fix ixgbe_max_channels so that it will not allow a setting of queues
to be higher than the num_online_cpus(). And when run to ixgbe_xdp_setup,
take the smaller value of num_rx_queues and num_xdp_queues.</Note>
    </Notes>
    <CVE>CVE-2021-47399</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47399.html</URL>
        <Description>CVE-2021-47399</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225328</URL>
        <Description>SUSE Bug 1225328</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ipack: ipoctal: fix module reference leak

A reference to the carrier module was taken on every open but was only
released once when the final reference to the tty struct was dropped.

Fix this by taking the module reference and initialising the tty driver
data when installing the tty.</Note>
    </Notes>
    <CVE>CVE-2021-47403</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47403.html</URL>
        <Description>CVE-2021-47403</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225241</URL>
        <Description>SUSE Bug 1225241</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

HID: usbhid: free raw_report buffers in usbhid_stop

Free the unsent raw_report buffers when the device is removed.

Fixes a memory leak reported by syzbot at:
https://syzkaller.appspot.com/bug?id=7b4fa7cb1a7c2d3342a2a8a6c53371c8c418ab47</Note>
    </Notes>
    <CVE>CVE-2021-47405</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47405.html</URL>
        <Description>CVE-2021-47405</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225238</URL>
        <Description>SUSE Bug 1225238</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path

Prior to this patch in case mlx5_core_destroy_cq() failed it returns
without completing all destroy operations and that leads to memory leak.
Instead, complete the destroy flow before return error.

Also move mlx5_debug_cq_remove() to the beginning of mlx5_core_destroy_cq()
to be symmetrical with mlx5_core_create_cq().

kmemleak complains on:

unreferenced object 0xc000000038625100 (size 64):
  comm "ethtool", pid 28301, jiffies 4298062946 (age 785.380s)
  hex dump (first 32 bytes):
    60 01 48 94 00 00 00 c0 b8 05 34 c3 00 00 00 c0  `.H.......4.....
    02 00 00 00 00 00 00 00 00 db 7d c1 00 00 00 c0  ..........}.....
  backtrace:
    [&lt;000000009e8643cb&gt;] add_res_tree+0xd0/0x270 [mlx5_core]
    [&lt;00000000e7cb8e6c&gt;] mlx5_debug_cq_add+0x5c/0xc0 [mlx5_core]
    [&lt;000000002a12918f&gt;] mlx5_core_create_cq+0x1d0/0x2d0 [mlx5_core]
    [&lt;00000000cef0a696&gt;] mlx5e_create_cq+0x210/0x3f0 [mlx5_core]
    [&lt;000000009c642c26&gt;] mlx5e_open_cq+0xb4/0x130 [mlx5_core]
    [&lt;0000000058dfa578&gt;] mlx5e_ptp_open+0x7f4/0xe10 [mlx5_core]
    [&lt;0000000081839561&gt;] mlx5e_open_channels+0x9cc/0x13e0 [mlx5_core]
    [&lt;0000000009cf05d4&gt;] mlx5e_switch_priv_channels+0xa4/0x230
[mlx5_core]
    [&lt;0000000042bbedd8&gt;] mlx5e_safe_switch_params+0x14c/0x300
[mlx5_core]
    [&lt;0000000004bc9db8&gt;] set_pflag_tx_port_ts+0x9c/0x160 [mlx5_core]
    [&lt;00000000a0553443&gt;] mlx5e_set_priv_flags+0xd0/0x1b0 [mlx5_core]
    [&lt;00000000a8f3d84b&gt;] ethnl_set_privflags+0x234/0x2d0
    [&lt;00000000fd27f27c&gt;] genl_family_rcv_msg_doit+0x108/0x1d0
    [&lt;00000000f495e2bb&gt;] genl_family_rcv_msg+0xe4/0x1f0
    [&lt;00000000646c5c2c&gt;] genl_rcv_msg+0x78/0x120
    [&lt;00000000d53e384e&gt;] netlink_rcv_skb+0x74/0x1a0</Note>
    </Notes>
    <CVE>CVE-2021-47438</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47438.html</URL>
        <Description>CVE-2021-47438</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225229</URL>
        <Description>SUSE Bug 1225229</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mlxsw: thermal: Fix out-of-bounds memory accesses

Currently, mlxsw allows cooling states to be set above the maximum
cooling state supported by the driver:

 # cat /sys/class/thermal/thermal_zone2/cdev0/type
 mlxsw_fan
 # cat /sys/class/thermal/thermal_zone2/cdev0/max_state
 10
 # echo 18 &gt; /sys/class/thermal/thermal_zone2/cdev0/cur_state
 # echo $?
 0

This results in out-of-bounds memory accesses when thermal state
transition statistics are enabled (CONFIG_THERMAL_STATISTICS=y), as the
transition table is accessed with a too large index (state) [1].

According to the thermal maintainer, it is the responsibility of the
driver to reject such operations [2].

Therefore, return an error when the state to be set exceeds the maximum
cooling state supported by the driver.

To avoid dead code, as suggested by the thermal maintainer [3],
partially revert commit a421ce088ac8 ("mlxsw: core: Extend cooling
device with cooling levels") that tried to interpret these invalid
cooling states (above the maximum) in a special way. The cooling levels
array is not removed in order to prevent the fans going below 20% PWM,
which would cause them to get stuck at 0% PWM.

[1]
BUG: KASAN: slab-out-of-bounds in thermal_cooling_device_stats_update+0x271/0x290
Read of size 4 at addr ffff8881052f7bf8 by task kworker/0:0/5

CPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.15.0-rc3-custom-45935-gce1adf704b14 #122
Hardware name: Mellanox Technologies Ltd. "MSN2410-CB2FO"/"SA000874", BIOS 4.6.5 03/08/2016
Workqueue: events_freezable_power_ thermal_zone_device_check
Call Trace:
 dump_stack_lvl+0x8b/0xb3
 print_address_description.constprop.0+0x1f/0x140
 kasan_report.cold+0x7f/0x11b
 thermal_cooling_device_stats_update+0x271/0x290
 __thermal_cdev_update+0x15e/0x4e0
 thermal_cdev_update+0x9f/0xe0
 step_wise_throttle+0x770/0xee0
 thermal_zone_device_update+0x3f6/0xdf0
 process_one_work+0xa42/0x1770
 worker_thread+0x62f/0x13e0
 kthread+0x3ee/0x4e0
 ret_from_fork+0x1f/0x30

Allocated by task 1:
 kasan_save_stack+0x1b/0x40
 __kasan_kmalloc+0x7c/0x90
 thermal_cooling_device_setup_sysfs+0x153/0x2c0
 __thermal_cooling_device_register.part.0+0x25b/0x9c0
 thermal_cooling_device_register+0xb3/0x100
 mlxsw_thermal_init+0x5c5/0x7e0
 __mlxsw_core_bus_device_register+0xcb3/0x19c0
 mlxsw_core_bus_device_register+0x56/0xb0
 mlxsw_pci_probe+0x54f/0x710
 local_pci_probe+0xc6/0x170
 pci_device_probe+0x2b2/0x4d0
 really_probe+0x293/0xd10
 __driver_probe_device+0x2af/0x440
 driver_probe_device+0x51/0x1e0
 __driver_attach+0x21b/0x530
 bus_for_each_dev+0x14c/0x1d0
 bus_add_driver+0x3ac/0x650
 driver_register+0x241/0x3d0
 mlxsw_sp_module_init+0xa2/0x174
 do_one_initcall+0xee/0x5f0
 kernel_init_freeable+0x45a/0x4de
 kernel_init+0x1f/0x210
 ret_from_fork+0x1f/0x30

The buggy address belongs to the object at ffff8881052f7800
 which belongs to the cache kmalloc-1k of size 1024
The buggy address is located 1016 bytes inside of
 1024-byte region [ffff8881052f7800, ffff8881052f7c00)
The buggy address belongs to the page:
page:0000000052355272 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1052f0
head:0000000052355272 order:3 compound_mapcount:0 compound_pincount:0
flags: 0x200000000010200(slab|head|node=0|zone=2)
raw: 0200000000010200 ffffea0005034800 0000000300000003 ffff888100041dc0
raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 ffff8881052f7a80: 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc
 ffff8881052f7b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
&gt;ffff8881052f7b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
                                                                ^
 ffff8881052f7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
 ffff8881052f7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc

[2] https://lore.kernel.org/linux-pm/9aca37cb-1629-5c67-
---truncated---</Note>
    </Notes>
    <CVE>CVE-2021-47441</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47441.html</URL>
        <Description>CVE-2021-47441</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225224</URL>
        <Description>SUSE Bug 1225224</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

isdn: mISDN: Fix sleeping function called from invalid context

The driver can call card-&gt;isac.release() function from an atomic
context.

Fix this by calling this function after releasing the lock.

The following log reveals it:

[   44.168226 ] BUG: sleeping function called from invalid context at kernel/workqueue.c:3018
[   44.168941 ] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 5475, name: modprobe
[   44.169574 ] INFO: lockdep is turned off.
[   44.169899 ] irq event stamp: 0
[   44.170160 ] hardirqs last  enabled at (0): [&lt;0000000000000000&gt;] 0x0
[   44.170627 ] hardirqs last disabled at (0): [&lt;ffffffff814209ed&gt;] copy_process+0x132d/0x3e00
[   44.171240 ] softirqs last  enabled at (0): [&lt;ffffffff81420a1a&gt;] copy_process+0x135a/0x3e00
[   44.171852 ] softirqs last disabled at (0): [&lt;0000000000000000&gt;] 0x0
[   44.172318 ] Preemption disabled at:
[   44.172320 ] [&lt;ffffffffa009b0a9&gt;] nj_release+0x69/0x500 [netjet]
[   44.174441 ] Call Trace:
[   44.174630 ]  dump_stack_lvl+0xa8/0xd1
[   44.174912 ]  dump_stack+0x15/0x17
[   44.175166 ]  ___might_sleep+0x3a2/0x510
[   44.175459 ]  ? nj_release+0x69/0x500 [netjet]
[   44.175791 ]  __might_sleep+0x82/0xe0
[   44.176063 ]  ? start_flush_work+0x20/0x7b0
[   44.176375 ]  start_flush_work+0x33/0x7b0
[   44.176672 ]  ? trace_irq_enable_rcuidle+0x85/0x170
[   44.177034 ]  ? kasan_quarantine_put+0xaa/0x1f0
[   44.177372 ]  ? kasan_quarantine_put+0xaa/0x1f0
[   44.177711 ]  __flush_work+0x11a/0x1a0
[   44.177991 ]  ? flush_work+0x20/0x20
[   44.178257 ]  ? lock_release+0x13c/0x8f0
[   44.178550 ]  ? __kasan_check_write+0x14/0x20
[   44.178872 ]  ? do_raw_spin_lock+0x148/0x360
[   44.179187 ]  ? read_lock_is_recursive+0x20/0x20
[   44.179530 ]  ? __kasan_check_read+0x11/0x20
[   44.179846 ]  ? do_raw_spin_unlock+0x55/0x900
[   44.180168 ]  ? ____kasan_slab_free+0x116/0x140
[   44.180505 ]  ? _raw_spin_unlock_irqrestore+0x41/0x60
[   44.180878 ]  ? skb_queue_purge+0x1a3/0x1c0
[   44.181189 ]  ? kfree+0x13e/0x290
[   44.181438 ]  flush_work+0x17/0x20
[   44.181695 ]  mISDN_freedchannel+0xe8/0x100
[   44.182006 ]  isac_release+0x210/0x260 [mISDNipac]
[   44.182366 ]  nj_release+0xf6/0x500 [netjet]
[   44.182685 ]  nj_remove+0x48/0x70 [netjet]
[   44.182989 ]  pci_device_remove+0xa9/0x250</Note>
    </Notes>
    <CVE>CVE-2021-47468</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47468.html</URL>
        <Description>CVE-2021-47468</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225346</URL>
        <Description>SUSE Bug 1225346</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

dm rq: don't queue request to blk-mq during DM suspend

DM uses blk-mq's quiesce/unquiesce to stop/start device mapper queue.

But blk-mq's unquiesce may come from outside events, such as elevator
switch, updating nr_requests or others, and request may come during
suspend, so simply ask for blk-mq to requeue it.

Fixes one kernel panic issue when running updating nr_requests and
dm-mpath suspend/resume stress test.</Note>
    </Notes>
    <CVE>CVE-2021-47498</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47498.html</URL>
        <Description>CVE-2021-47498</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225357</URL>
        <Description>SUSE Bug 1225357</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc

When trying to dump VFs VSI RX/TX descriptors
using debugfs there was a crash
due to NULL pointer dereference in i40e_dbg_dump_desc.
Added a check to i40e_dbg_dump_desc that checks if
VSI type is correct for dumping RX/TX descriptors.</Note>
    </Notes>
    <CVE>CVE-2021-47501</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47501.html</URL>
        <Description>CVE-2021-47501</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225361</URL>
        <Description>SUSE Bug 1225361</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nfp: Fix memory leak in nfp_cpp_area_cache_add()

In line 800 (#1), nfp_cpp_area_alloc() allocates and initializes a
CPP area structure. But in line 807 (#2), when the cache is allocated
failed, this CPP area structure is not freed, which will result in
memory leak.

We can fix it by freeing the CPP area when the cache is allocated
failed (#2).

792 int nfp_cpp_area_cache_add(struct nfp_cpp *cpp, size_t size)
793 {
794 	struct nfp_cpp_area_cache *cache;
795 	struct nfp_cpp_area *area;

800	area = nfp_cpp_area_alloc(cpp, NFP_CPP_ID(7, NFP_CPP_ACTION_RW, 0),
801 				  0, size);
	// #1: allocates and initializes

802 	if (!area)
803 		return -ENOMEM;

805 	cache = kzalloc(sizeof(*cache), GFP_KERNEL);
806 	if (!cache)
807 		return -ENOMEM; // #2: missing free

817	return 0;
818 }</Note>
    </Notes>
    <CVE>CVE-2021-47516</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47516.html</URL>
        <Description>CVE-2021-47516</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225427</URL>
        <Description>SUSE Bug 1225427</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

can: pch_can: pch_can_rx_normal: fix use after free

After calling netif_receive_skb(skb), dereferencing skb is unsafe.
Especially, the can_frame cf which aliases skb memory is dereferenced
just after the call netif_receive_skb(skb).

Reordering the lines solves the issue.</Note>
    </Notes>
    <CVE>CVE-2021-47520</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47520.html</URL>
        <Description>CVE-2021-47520</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225431</URL>
        <Description>SUSE Bug 1225431</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227905</URL>
        <Description>SUSE Bug 1227905</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings()

In qlcnic_83xx_add_rings(), the indirect function of
ahw-&gt;hw_ops-&gt;alloc_mbx_args will be called to allocate memory for
cmd.req.arg, and there is a dereference of it in qlcnic_83xx_add_rings(),
which could lead to a NULL pointer dereference on failure of the
indirect function like qlcnic_83xx_alloc_mbx_args().

Fix this bug by adding a check of alloc_mbx_args(), this patch
imitates the logic of mbx_cmd()'s failure handling.

This bug was found by a static analyzer. The analysis employs
differential checking to identify inconsistent security operations
(e.g., checks or kfrees) between two code paths and confirms that the
inconsistent operations are not recovered in the current function or
the callers, so they constitute bugs.

Note that, as a bug found by static analysis, it can be a false
positive or hard to trigger. Multiple researchers have cross-reviewed
the bug.

Builds with CONFIG_QLCNIC=m show no new warnings, and our
static analyzer no longer warns about this code.</Note>
    </Notes>
    <CVE>CVE-2021-47542</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47542.html</URL>
        <Description>CVE-2021-47542</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225455</URL>
        <Description>SUSE Bug 1225455</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: tulip: de4x5: fix the problem that the array 'lp-&gt;phy[8]' may be out of bound

In line 5001, if all id in the array 'lp-&gt;phy[8]' is not 0, when the
'for' end, the 'k' is 8.

At this time, the array 'lp-&gt;phy[8]' may be out of bound.</Note>
    </Notes>
    <CVE>CVE-2021-47547</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47547.html</URL>
        <Description>CVE-2021-47547</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225505</URL>
        <Description>SUSE Bug 1225505</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk()

Coverity reports a possible NULL dereferencing problem:

in smc_vlan_by_tcpsk():
6. returned_null: netdev_lower_get_next returns NULL (checked 29 out of 30 times).
7. var_assigned: Assigning: ndev = NULL return value from netdev_lower_get_next.
1623                ndev = (struct net_device *)netdev_lower_get_next(ndev, &amp;lower);
CID 1468509 (#1 of 1): Dereference null return value (NULL_RETURNS)
8. dereference: Dereferencing a pointer that might be NULL ndev when calling is_vlan_dev.
1624                if (is_vlan_dev(ndev)) {

Remove the manual implementation and use netdev_walk_all_lower_dev() to
iterate over the lower devices. While on it remove an obsolete function
parameter comment.</Note>
    </Notes>
    <CVE>CVE-2021-47559</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47559.html</URL>
        <Description>CVE-2021-47559</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225396</URL>
        <Description>SUSE Bug 1225396</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: scsi_debug: Fix type in min_t to avoid stack OOB

Change min_t() to use type "u32" instead of type "int" to avoid stack out
of bounds. With min_t() type "int" the values get sign extended and the
larger value gets used causing stack out of bounds.

BUG: KASAN: stack-out-of-bounds in memcpy include/linux/fortify-string.h:191 [inline]
BUG: KASAN: stack-out-of-bounds in sg_copy_buffer+0x1de/0x240 lib/scatterlist.c:976
Read of size 127 at addr ffff888072607128 by task syz-executor.7/18707

CPU: 1 PID: 18707 Comm: syz-executor.7 Not tainted 5.15.0-syzk #1
Hardware name: Red Hat KVM, BIOS 1.13.0-2
Call Trace:
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x89/0xb5 lib/dump_stack.c:106
 print_address_description.constprop.9+0x28/0x160 mm/kasan/report.c:256
 __kasan_report mm/kasan/report.c:442 [inline]
 kasan_report.cold.14+0x7d/0x117 mm/kasan/report.c:459
 check_region_inline mm/kasan/generic.c:183 [inline]
 kasan_check_range+0x1a3/0x210 mm/kasan/generic.c:189
 memcpy+0x23/0x60 mm/kasan/shadow.c:65
 memcpy include/linux/fortify-string.h:191 [inline]
 sg_copy_buffer+0x1de/0x240 lib/scatterlist.c:976
 sg_copy_from_buffer+0x33/0x40 lib/scatterlist.c:1000
 fill_from_dev_buffer.part.34+0x82/0x130 drivers/scsi/scsi_debug.c:1162
 fill_from_dev_buffer drivers/scsi/scsi_debug.c:1888 [inline]
 resp_readcap16+0x365/0x3b0 drivers/scsi/scsi_debug.c:1887
 schedule_resp+0x4d8/0x1a70 drivers/scsi/scsi_debug.c:5478
 scsi_debug_queuecommand+0x8c9/0x1ec0 drivers/scsi/scsi_debug.c:7533
 scsi_dispatch_cmd drivers/scsi/scsi_lib.c:1520 [inline]
 scsi_queue_rq+0x16b0/0x2d40 drivers/scsi/scsi_lib.c:1699
 blk_mq_dispatch_rq_list+0xb9b/0x2700 block/blk-mq.c:1639
 __blk_mq_sched_dispatch_requests+0x28f/0x590 block/blk-mq-sched.c:325
 blk_mq_sched_dispatch_requests+0x105/0x190 block/blk-mq-sched.c:358
 __blk_mq_run_hw_queue+0xe5/0x150 block/blk-mq.c:1761
 __blk_mq_delay_run_hw_queue+0x4f8/0x5c0 block/blk-mq.c:1838
 blk_mq_run_hw_queue+0x18d/0x350 block/blk-mq.c:1891
 blk_mq_sched_insert_request+0x3db/0x4e0 block/blk-mq-sched.c:474
 blk_execute_rq_nowait+0x16b/0x1c0 block/blk-exec.c:62
 sg_common_write.isra.18+0xeb3/0x2000 drivers/scsi/sg.c:836
 sg_new_write.isra.19+0x570/0x8c0 drivers/scsi/sg.c:774
 sg_ioctl_common+0x14d6/0x2710 drivers/scsi/sg.c:939
 sg_ioctl+0xa2/0x180 drivers/scsi/sg.c:1165
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:874 [inline]
 __se_sys_ioctl fs/ioctl.c:860 [inline]
 __x64_sys_ioctl+0x19d/0x220 fs/ioctl.c:860
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3a/0x80 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae</Note>
    </Notes>
    <CVE>CVE-2021-47580</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47580.html</URL>
        <Description>CVE-2021-47580</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226550</URL>
        <Description>SUSE Bug 1226550</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227611</URL>
        <Description>SUSE Bug 1227611</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

USB: core: Make do_proc_control() and do_proc_bulk() killable

The USBDEVFS_CONTROL and USBDEVFS_BULK ioctls invoke
usb_start_wait_urb(), which contains an uninterruptible wait with a
user-specified timeout value.  If timeout value is very large and the
device being accessed does not respond in a reasonable amount of time,
the kernel will complain about "Task X blocked for more than N
seconds", as found in testing by syzbot:

INFO: task syz-executor.0:8700 blocked for more than 143 seconds.
      Not tainted 5.14.0-rc7-syzkaller #0
"echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor.0  state:D stack:23192 pid: 8700 ppid:  8455 flags:0x00004004
Call Trace:
 context_switch kernel/sched/core.c:4681 [inline]
 __schedule+0xc07/0x11f0 kernel/sched/core.c:5938
 schedule+0x14b/0x210 kernel/sched/core.c:6017
 schedule_timeout+0x98/0x2f0 kernel/time/timer.c:1857
 do_wait_for_common+0x2da/0x480 kernel/sched/completion.c:85
 __wait_for_common kernel/sched/completion.c:106 [inline]
 wait_for_common kernel/sched/completion.c:117 [inline]
 wait_for_completion_timeout+0x46/0x60 kernel/sched/completion.c:157
 usb_start_wait_urb+0x167/0x550 drivers/usb/core/message.c:63
 do_proc_bulk+0x978/0x1080 drivers/usb/core/devio.c:1236
 proc_bulk drivers/usb/core/devio.c:1273 [inline]
 usbdev_do_ioctl drivers/usb/core/devio.c:2547 [inline]
 usbdev_ioctl+0x3441/0x6b10 drivers/usb/core/devio.c:2713
...

To fix this problem, this patch replaces usbfs's calls to
usb_control_msg() and usb_bulk_msg() with special-purpose code that
does essentially the same thing (as recommended in the comment for
usb_start_wait_urb()), except that it always uses a killable wait and
it uses GFP_KERNEL rather than GFP_NOIO.</Note>
    </Notes>
    <CVE>CVE-2021-47582</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47582.html</URL>
        <Description>CVE-2021-47582</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226559</URL>
        <Description>SUSE Bug 1226559</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

sit: do not call ipip6_dev_free() from sit_init_net()

ipip6_dev_free is sit dev-&gt;priv_destructor, already called
by register_netdevice() if something goes wrong.

Alternative would be to make ipip6_dev_free() robust against
multiple invocations, but other drivers do not implement this
strategy.

syzbot reported:

dst_release underflow
WARNING: CPU: 0 PID: 5059 at net/core/dst.c:173 dst_release+0xd8/0xe0 net/core/dst.c:173
Modules linked in:
CPU: 1 PID: 5059 Comm: syz-executor.4 Not tainted 5.16.0-rc5-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:dst_release+0xd8/0xe0 net/core/dst.c:173
Code: 4c 89 f2 89 d9 31 c0 5b 41 5e 5d e9 da d5 44 f9 e8 1d 90 5f f9 c6 05 87 48 c6 05 01 48 c7 c7 80 44 99 8b 31 c0 e8 e8 67 29 f9 &lt;0f&gt; 0b eb 85 0f 1f 40 00 53 48 89 fb e8 f7 8f 5f f9 48 83 c3 a8 48
RSP: 0018:ffffc9000aa5faa0 EFLAGS: 00010246
RAX: d6894a925dd15a00 RBX: 00000000ffffffff RCX: 0000000000040000
RDX: ffffc90005e19000 RSI: 000000000003ffff RDI: 0000000000040000
RBP: 0000000000000000 R08: ffffffff816a1f42 R09: ffffed1017344f2c
R10: ffffed1017344f2c R11: 0000000000000000 R12: 0000607f462b1358
R13: 1ffffffff1bfd305 R14: ffffe8ffffcb1358 R15: dffffc0000000000
FS:  00007f66c71a2700(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f88aaed5058 CR3: 0000000023e0f000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 dst_cache_destroy+0x107/0x1e0 net/core/dst_cache.c:160
 ipip6_dev_free net/ipv6/sit.c:1414 [inline]
 sit_init_net+0x229/0x550 net/ipv6/sit.c:1936
 ops_init+0x313/0x430 net/core/net_namespace.c:140
 setup_net+0x35b/0x9d0 net/core/net_namespace.c:326
 copy_net_ns+0x359/0x5c0 net/core/net_namespace.c:470
 create_new_namespaces+0x4ce/0xa00 kernel/nsproxy.c:110
 unshare_nsproxy_namespaces+0x11e/0x180 kernel/nsproxy.c:226
 ksys_unshare+0x57d/0xb50 kernel/fork.c:3075
 __do_sys_unshare kernel/fork.c:3146 [inline]
 __se_sys_unshare kernel/fork.c:3144 [inline]
 __x64_sys_unshare+0x34/0x40 kernel/fork.c:3144
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x44/0xd0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f66c882ce99
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f66c71a2168 EFLAGS: 00000246 ORIG_RAX: 0000000000000110
RAX: ffffffffffffffda RBX: 00007f66c893ff60 RCX: 00007f66c882ce99
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000048040200
RBP: 00007f66c8886ff1 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fff6634832f R14: 00007f66c71a2300 R15: 0000000000022000
 &lt;/TASK&gt;</Note>
    </Notes>
    <CVE>CVE-2021-47588</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47588.html</URL>
        <Description>CVE-2021-47588</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226568</URL>
        <Description>SUSE Bug 1226568</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

inet_diag: fix kernel-infoleak for UDP sockets

KMSAN reported a kernel-infoleak [1], that can exploited
by unpriv users.

After analysis it turned out UDP was not initializing
r-&gt;idiag_expires. Other users of inet_sk_diag_fill()
might make the same mistake in the future, so fix this
in inet_sk_diag_fill().

[1]
BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:121 [inline]
BUG: KMSAN: kernel-infoleak in copyout lib/iov_iter.c:156 [inline]
BUG: KMSAN: kernel-infoleak in _copy_to_iter+0x69d/0x25c0 lib/iov_iter.c:670
 instrument_copy_to_user include/linux/instrumented.h:121 [inline]
 copyout lib/iov_iter.c:156 [inline]
 _copy_to_iter+0x69d/0x25c0 lib/iov_iter.c:670
 copy_to_iter include/linux/uio.h:155 [inline]
 simple_copy_to_iter+0xf3/0x140 net/core/datagram.c:519
 __skb_datagram_iter+0x2cb/0x1280 net/core/datagram.c:425
 skb_copy_datagram_iter+0xdc/0x270 net/core/datagram.c:533
 skb_copy_datagram_msg include/linux/skbuff.h:3657 [inline]
 netlink_recvmsg+0x660/0x1c60 net/netlink/af_netlink.c:1974
 sock_recvmsg_nosec net/socket.c:944 [inline]
 sock_recvmsg net/socket.c:962 [inline]
 sock_read_iter+0x5a9/0x630 net/socket.c:1035
 call_read_iter include/linux/fs.h:2156 [inline]
 new_sync_read fs/read_write.c:400 [inline]
 vfs_read+0x1631/0x1980 fs/read_write.c:481
 ksys_read+0x28c/0x520 fs/read_write.c:619
 __do_sys_read fs/read_write.c:629 [inline]
 __se_sys_read fs/read_write.c:627 [inline]
 __x64_sys_read+0xdb/0x120 fs/read_write.c:627
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82
 entry_SYSCALL_64_after_hwframe+0x44/0xae

Uninit was created at:
 slab_post_alloc_hook mm/slab.h:524 [inline]
 slab_alloc_node mm/slub.c:3251 [inline]
 __kmalloc_node_track_caller+0xe0c/0x1510 mm/slub.c:4974
 kmalloc_reserve net/core/skbuff.c:354 [inline]
 __alloc_skb+0x545/0xf90 net/core/skbuff.c:426
 alloc_skb include/linux/skbuff.h:1126 [inline]
 netlink_dump+0x3d5/0x16a0 net/netlink/af_netlink.c:2245
 __netlink_dump_start+0xd1c/0xee0 net/netlink/af_netlink.c:2370
 netlink_dump_start include/linux/netlink.h:254 [inline]
 inet_diag_handler_cmd+0x2e7/0x400 net/ipv4/inet_diag.c:1343
 sock_diag_rcv_msg+0x24a/0x620
 netlink_rcv_skb+0x447/0x800 net/netlink/af_netlink.c:2491
 sock_diag_rcv+0x63/0x80 net/core/sock_diag.c:276
 netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]
 netlink_unicast+0x1095/0x1360 net/netlink/af_netlink.c:1345
 netlink_sendmsg+0x16f3/0x1870 net/netlink/af_netlink.c:1916
 sock_sendmsg_nosec net/socket.c:704 [inline]
 sock_sendmsg net/socket.c:724 [inline]
 sock_write_iter+0x594/0x690 net/socket.c:1057
 do_iter_readv_writev+0xa7f/0xc70
 do_iter_write+0x52c/0x1500 fs/read_write.c:851
 vfs_writev fs/read_write.c:924 [inline]
 do_writev+0x63f/0xe30 fs/read_write.c:967
 __do_sys_writev fs/read_write.c:1040 [inline]
 __se_sys_writev fs/read_write.c:1037 [inline]
 __x64_sys_writev+0xe5/0x120 fs/read_write.c:1037
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82
 entry_SYSCALL_64_after_hwframe+0x44/0xae

Bytes 68-71 of 312 are uninitialized
Memory access of size 312 starts at ffff88812ab54000
Data copied to user address 0000000020001440

CPU: 1 PID: 6365 Comm: syz-executor801 Not tainted 5.16.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011</Note>
    </Notes>
    <CVE>CVE-2021-47597</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47597.html</URL>
        <Description>CVE-2021-47597</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226553</URL>
        <Description>SUSE Bug 1226553</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

btrfs: use latest_dev in btrfs_show_devname

The test case btrfs/238 reports the warning below:

 WARNING: CPU: 3 PID: 481 at fs/btrfs/super.c:2509 btrfs_show_devname+0x104/0x1e8 [btrfs]
 CPU: 2 PID: 1 Comm: systemd Tainted: G        W  O 5.14.0-rc1-custom #72
 Hardware name: QEMU QEMU Virtual Machine, BIOS 0.0.0 02/06/2015
 Call trace:
   btrfs_show_devname+0x108/0x1b4 [btrfs]
   show_mountinfo+0x234/0x2c4
   m_show+0x28/0x34
   seq_read_iter+0x12c/0x3c4
   vfs_read+0x29c/0x2c8
   ksys_read+0x80/0xec
   __arm64_sys_read+0x28/0x34
   invoke_syscall+0x50/0xf8
   do_el0_svc+0x88/0x138
   el0_svc+0x2c/0x8c
   el0t_64_sync_handler+0x84/0xe4
   el0t_64_sync+0x198/0x19c

Reason:
While btrfs_prepare_sprout() moves the fs_devices::devices into
fs_devices::seed_list, the btrfs_show_devname() searches for the devices
and found none, leading to the warning as in above.

Fix:
latest_dev is updated according to the changes to the device list.
That means we could use the latest_dev-&gt;name to show the device name in
/proc/self/mounts, the pointer will be always valid as it's assigned
before the device is deleted from the list in remove or replace.
The RCU protection is sufficient as the device structure is freed after
synchronization.</Note>
    </Notes>
    <CVE>CVE-2021-47599</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47599.html</URL>
        <Description>CVE-2021-47599</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226571</URL>
        <Description>SUSE Bug 1226571</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: netlink: af_netlink: Prevent empty skb by adding a check on len.

Adding a check on len parameter to avoid empty skb. This prevents a
division error in netem_enqueue function which is caused when skb-&gt;len=0
and skb-&gt;data_len=0 in the randomized corruption step as shown below.

skb-&gt;data[prandom_u32() % skb_headlen(skb)] ^= 1&lt;&lt;(prandom_u32() % 8);

Crash Report:
[  343.170349] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family
0 port 6081 - 0
[  343.216110] netem: version 1.3
[  343.235841] divide error: 0000 [#1] PREEMPT SMP KASAN NOPTI
[  343.236680] CPU: 3 PID: 4288 Comm: reproducer Not tainted 5.16.0-rc1+
[  343.237569] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),
BIOS 1.11.0-2.el7 04/01/2014
[  343.238707] RIP: 0010:netem_enqueue+0x1590/0x33c0 [sch_netem]
[  343.239499] Code: 89 85 58 ff ff ff e8 5f 5d e9 d3 48 8b b5 48 ff ff
ff 8b 8d 50 ff ff ff 8b 85 58 ff ff ff 48 8b bd 70 ff ff ff 31 d2 2b 4f
74 &lt;f7&gt; f1 48 b8 00 00 00 00 00 fc ff df 49 01 d5 4c 89 e9 48 c1 e9 03
[  343.241883] RSP: 0018:ffff88800bcd7368 EFLAGS: 00010246
[  343.242589] RAX: 00000000ba7c0a9c RBX: 0000000000000001 RCX:
0000000000000000
[  343.243542] RDX: 0000000000000000 RSI: ffff88800f8edb10 RDI:
ffff88800f8eda40
[  343.244474] RBP: ffff88800bcd7458 R08: 0000000000000000 R09:
ffffffff94fb8445
[  343.245403] R10: ffffffff94fb8336 R11: ffffffff94fb8445 R12:
0000000000000000
[  343.246355] R13: ffff88800a5a7000 R14: ffff88800a5b5800 R15:
0000000000000020
[  343.247291] FS:  00007fdde2bd7700(0000) GS:ffff888109780000(0000)
knlGS:0000000000000000
[  343.248350] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  343.249120] CR2: 00000000200000c0 CR3: 000000000ef4c000 CR4:
00000000000006e0
[  343.250076] Call Trace:
[  343.250423]  &lt;TASK&gt;
[  343.250713]  ? memcpy+0x4d/0x60
[  343.251162]  ? netem_init+0xa0/0xa0 [sch_netem]
[  343.251795]  ? __sanitizer_cov_trace_pc+0x21/0x60
[  343.252443]  netem_enqueue+0xe28/0x33c0 [sch_netem]
[  343.253102]  ? stack_trace_save+0x87/0xb0
[  343.253655]  ? filter_irq_stacks+0xb0/0xb0
[  343.254220]  ? netem_init+0xa0/0xa0 [sch_netem]
[  343.254837]  ? __kasan_check_write+0x14/0x20
[  343.255418]  ? _raw_spin_lock+0x88/0xd6
[  343.255953]  dev_qdisc_enqueue+0x50/0x180
[  343.256508]  __dev_queue_xmit+0x1a7e/0x3090
[  343.257083]  ? netdev_core_pick_tx+0x300/0x300
[  343.257690]  ? check_kcov_mode+0x10/0x40
[  343.258219]  ? _raw_spin_unlock_irqrestore+0x29/0x40
[  343.258899]  ? __kasan_init_slab_obj+0x24/0x30
[  343.259529]  ? setup_object.isra.71+0x23/0x90
[  343.260121]  ? new_slab+0x26e/0x4b0
[  343.260609]  ? kasan_poison+0x3a/0x50
[  343.261118]  ? kasan_unpoison+0x28/0x50
[  343.261637]  ? __kasan_slab_alloc+0x71/0x90
[  343.262214]  ? memcpy+0x4d/0x60
[  343.262674]  ? write_comp_data+0x2f/0x90
[  343.263209]  ? __kasan_check_write+0x14/0x20
[  343.263802]  ? __skb_clone+0x5d6/0x840
[  343.264329]  ? __sanitizer_cov_trace_pc+0x21/0x60
[  343.264958]  dev_queue_xmit+0x1c/0x20
[  343.265470]  netlink_deliver_tap+0x652/0x9c0
[  343.266067]  netlink_unicast+0x5a0/0x7f0
[  343.266608]  ? netlink_attachskb+0x860/0x860
[  343.267183]  ? __sanitizer_cov_trace_pc+0x21/0x60
[  343.267820]  ? write_comp_data+0x2f/0x90
[  343.268367]  netlink_sendmsg+0x922/0xe80
[  343.268899]  ? netlink_unicast+0x7f0/0x7f0
[  343.269472]  ? __sanitizer_cov_trace_pc+0x21/0x60
[  343.270099]  ? write_comp_data+0x2f/0x90
[  343.270644]  ? netlink_unicast+0x7f0/0x7f0
[  343.271210]  sock_sendmsg+0x155/0x190
[  343.271721]  ____sys_sendmsg+0x75f/0x8f0
[  343.272262]  ? kernel_sendmsg+0x60/0x60
[  343.272788]  ? write_comp_data+0x2f/0x90
[  343.273332]  ? write_comp_data+0x2f/0x90
[  343.273869]  ___sys_sendmsg+0x10f/0x190
[  343.274405]  ? sendmsg_copy_msghdr+0x80/0x80
[  343.274984]  ? slab_post_alloc_hook+0x70/0x230
[  343.275597]  ? futex_wait_setup+0x240/0x240
[  343.276175]  ? security_file_alloc+0x3e/0x170
[  343.276779]  ? write_comp_d
---truncated---</Note>
    </Notes>
    <CVE>CVE-2021-47606</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47606.html</URL>
        <Description>CVE-2021-47606</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226555</URL>
        <Description>SUSE Bug 1226555</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

i40e: Fix queues reservation for XDP

When XDP was configured on a system with large number of CPUs
and X722 NIC there was a call trace with NULL pointer dereference.

i40e 0000:87:00.0: failed to get tracking for 256 queues for VSI 0 err -12
i40e 0000:87:00.0: setup of MAIN VSI failed

BUG: kernel NULL pointer dereference, address: 0000000000000000
RIP: 0010:i40e_xdp+0xea/0x1b0 [i40e]
Call Trace:
? i40e_reconfig_rss_queues+0x130/0x130 [i40e]
dev_xdp_install+0x61/0xe0
dev_xdp_attach+0x18a/0x4c0
dev_change_xdp_fd+0x1e6/0x220
do_setlink+0x616/0x1030
? ahci_port_stop+0x80/0x80
? ata_qc_issue+0x107/0x1e0
? lock_timer_base+0x61/0x80
? __mod_timer+0x202/0x380
rtnl_setlink+0xe5/0x170
? bpf_lsm_binder_transaction+0x10/0x10
? security_capable+0x36/0x50
rtnetlink_rcv_msg+0x121/0x350
? rtnl_calcit.isra.0+0x100/0x100
netlink_rcv_skb+0x50/0xf0
netlink_unicast+0x1d3/0x2a0
netlink_sendmsg+0x22a/0x440
sock_sendmsg+0x5e/0x60
__sys_sendto+0xf0/0x160
? __sys_getsockname+0x7e/0xc0
? _copy_from_user+0x3c/0x80
? __sys_setsockopt+0xc8/0x1a0
__x64_sys_sendto+0x20/0x30
do_syscall_64+0x33/0x40
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f83fa7a39e0

This was caused by PF queue pile fragmentation due to
flow director VSI queue being placed right after main VSI.
Because of this main VSI was not able to resize its
queue allocation for XDP resulting in no queues allocated
for main VSI when XDP was turned on.

Fix this by always allocating last queue in PF queue pile
for a flow director VSI.</Note>
    </Notes>
    <CVE>CVE-2021-47619</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47619.html</URL>
        <Description>CVE-2021-47619</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226645</URL>
        <Description>SUSE Bug 1226645</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel</Note>
    </Notes>
    <CVE>CVE-2022-20368</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-20368.html</URL>
        <Description>CVE-2022-20368</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1202346</URL>
        <Description>SUSE Bug 1202346</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1212311</URL>
        <Description>SUSE Bug 1212311</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2964. Reason: This candidate is a reservation duplicate of CVE-2022-2964. Notes: All CVE users should reference CVE-2022-2964 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.</Note>
    </Notes>
    <CVE>CVE-2022-28748</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-28748.html</URL>
        <Description>CVE-2022-28748</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1196018</URL>
        <Description>SUSE Bug 1196018</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernel's driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.</Note>
    </Notes>
    <CVE>CVE-2022-2964</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2964.html</URL>
        <Description>CVE-2022-2964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1202686</URL>
        <Description>SUSE Bug 1202686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203008</URL>
        <Description>SUSE Bug 1203008</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208044</URL>
        <Description>SUSE Bug 1208044</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj

kobject_init_and_add() takes reference even when it fails.
According to the doc of kobject_init_and_add():

   If this function returns an error, kobject_put() must be called to
   properly clean up the memory associated with the object.

Fix memory leak by calling kobject_put().</Note>
    </Notes>
    <CVE>CVE-2022-48775</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48775.html</URL>
        <Description>CVE-2022-48775</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227924</URL>
        <Description>SUSE Bug 1227924</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task

Currently a use-after-free may occur if a sas_task is aborted by the upper
layer before we handle the I/O completion in mpi_ssp_completion() or
mpi_sata_completion().

In this case, the following are the two steps in handling those I/O
completions:

 - Call complete() to inform the upper layer handler of completion of
   the I/O.

 - Release driver resources associated with the sas_task in
   pm8001_ccb_task_free() call.

When complete() is called, the upper layer may free the sas_task. As such,
we should not touch the associated sas_task afterwards, but we do so in the
pm8001_ccb_task_free() call.

Fix by swapping the complete() and pm8001_ccb_task_free() calls ordering.</Note>
    </Notes>
    <CVE>CVE-2022-48792</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48792.html</URL>
        <Description>CVE-2022-48792</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228013</URL>
        <Description>SUSE Bug 1228013</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228017</URL>
        <Description>SUSE Bug 1228017</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: ieee802154: at86rf230: Stop leaking skb's

Upon error the ieee802154_xmit_complete() helper is not called. Only
ieee802154_wake_queue() is called manually. In the Tx case we then leak
the skb structure.

Free the skb structure upon error before returning when appropriate.

As the 'is_tx = 0' cannot be moved in the complete handler because of a
possible race between the delay in switching to STATE_RX_AACK_ON and a
new interrupt, we introduce an intermediate 'was_tx' boolean just for
this purpose.

There is no Fixes tag applying here, many changes have been made on this
area and the issue kind of always existed.</Note>
    </Notes>
    <CVE>CVE-2022-48794</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48794.html</URL>
        <Description>CVE-2022-48794</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228025</URL>
        <Description>SUSE Bug 1228025</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

vt_ioctl: fix array_index_nospec in vt_setactivate

array_index_nospec ensures that an out-of-bounds value is set to zero
on the transient path. Decreasing the value by one afterwards causes
a transient integer underflow. vsa.console should be decreased first
and then sanitized with array_index_nospec.

Kasper Acknowledgements: Jakob Koschel, Brian Johannesmeyer, Kaveh
Razavi, Herbert Bos, Cristiano Giuffrida from the VUSec group at VU
Amsterdam.</Note>
    </Notes>
    <CVE>CVE-2022-48804</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48804.html</URL>
        <Description>CVE-2022-48804</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227968</URL>
        <Description>SUSE Bug 1227968</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup

ax88179_rx_fixup() contains several out-of-bounds accesses that can be
triggered by a malicious (or defective) USB device, in particular:

 - The metadata array (hdr_off..hdr_off+2*pkt_cnt) can be out of bounds,
   causing OOB reads and (on big-endian systems) OOB endianness flips.
 - A packet can overlap the metadata array, causing a later OOB
   endianness flip to corrupt data used by a cloned SKB that has already
   been handed off into the network stack.
 - A packet SKB can be constructed whose tail is far beyond its end,
   causing out-of-bounds heap data to be considered part of the SKB's
   data.

I have tested that this can be used by a malicious USB device to send a
bogus ICMPv6 Echo Request and receive an ICMPv6 Echo Reply in response
that contains random kernel heap data.
It's probably also possible to get OOB writes from this on a
little-endian system somehow - maybe by triggering skb_cow() via IP
options processing -, but I haven't tested that.</Note>
    </Notes>
    <CVE>CVE-2022-48805</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48805.html</URL>
        <Description>CVE-2022-48805</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227969</URL>
        <Description>SUSE Bug 1227969</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path

ip[6]mr_free_table() can only be called under RTNL lock.

RTNL: assertion failed at net/core/dev.c (10367)
WARNING: CPU: 1 PID: 5890 at net/core/dev.c:10367 unregister_netdevice_many+0x1246/0x1850 net/core/dev.c:10367
Modules linked in:
CPU: 1 PID: 5890 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller-11627-g422ee58dc0ef #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:unregister_netdevice_many+0x1246/0x1850 net/core/dev.c:10367
Code: 0f 85 9b ee ff ff e8 69 07 4b fa ba 7f 28 00 00 48 c7 c6 00 90 ae 8a 48 c7 c7 40 90 ae 8a c6 05 6d b1 51 06 01 e8 8c 90 d8 01 &lt;0f&gt; 0b e9 70 ee ff ff e8 3e 07 4b fa 4c 89 e7 e8 86 2a 59 fa e9 ee
RSP: 0018:ffffc900046ff6e0 EFLAGS: 00010286
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: ffff888050f51d00 RSI: ffffffff815fa008 RDI: fffff520008dfece
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: ffffffff815f3d6e R11: 0000000000000000 R12: 00000000fffffff4
R13: dffffc0000000000 R14: ffffc900046ff750 R15: ffff88807b7dc000
FS:  00007f4ab736e700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fee0b4f8990 CR3: 000000001e7d2000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 mroute_clean_tables+0x244/0xb40 net/ipv6/ip6mr.c:1509
 ip6mr_free_table net/ipv6/ip6mr.c:389 [inline]
 ip6mr_rules_init net/ipv6/ip6mr.c:246 [inline]
 ip6mr_net_init net/ipv6/ip6mr.c:1306 [inline]
 ip6mr_net_init+0x3f0/0x4e0 net/ipv6/ip6mr.c:1298
 ops_init+0xaf/0x470 net/core/net_namespace.c:140
 setup_net+0x54f/0xbb0 net/core/net_namespace.c:331
 copy_net_ns+0x318/0x760 net/core/net_namespace.c:475
 create_new_namespaces+0x3f6/0xb20 kernel/nsproxy.c:110
 copy_namespaces+0x391/0x450 kernel/nsproxy.c:178
 copy_process+0x2e0c/0x7300 kernel/fork.c:2167
 kernel_clone+0xe7/0xab0 kernel/fork.c:2555
 __do_sys_clone+0xc8/0x110 kernel/fork.c:2672
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f4ab89f9059
Code: Unable to access opcode bytes at RIP 0x7f4ab89f902f.
RSP: 002b:00007f4ab736e118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038
RAX: ffffffffffffffda RBX: 00007f4ab8b0bf60 RCX: 00007f4ab89f9059
RDX: 0000000020000280 RSI: 0000000020000270 RDI: 0000000040200000
RBP: 00007f4ab8a5308d R08: 0000000020000300 R09: 0000000020000300
R10: 00000000200002c0 R11: 0000000000000206 R12: 0000000000000000
R13: 00007ffc3977cc1f R14: 00007f4ab736e300 R15: 0000000000022000
 &lt;/TASK&gt;</Note>
    </Notes>
    <CVE>CVE-2022-48810</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48810.html</URL>
        <Description>CVE-2022-48810</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227936</URL>
        <Description>SUSE Bug 1227936</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ibmvnic: don't release napi in __ibmvnic_open()

If __ibmvnic_open() encounters an error such as when setting link state,
it calls release_resources() which frees the napi structures needlessly.
Instead, have __ibmvnic_open() only clean up the work it did so far (i.e.
disable napi and irqs) and leave the rest to the callers.

If caller of __ibmvnic_open() is ibmvnic_open(), it should release the
resources immediately. If the caller is do_reset() or do_hard_reset(),
they will release the resources on the next reset.

This fixes following crash that occurred when running the drmgr command
several times to add/remove a vnic interface:

	[102056] ibmvnic 30000003 env3: Disabling rx_scrq[6] irq
	[102056] ibmvnic 30000003 env3: Disabling rx_scrq[7] irq
	[102056] ibmvnic 30000003 env3: Replenished 8 pools
	Kernel attempted to read user page (10) - exploit attempt? (uid: 0)
	BUG: Kernel NULL pointer dereference on read at 0x00000010
	Faulting instruction address: 0xc000000000a3c840
	Oops: Kernel access of bad area, sig: 11 [#1]
	LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries
	...
	CPU: 9 PID: 102056 Comm: kworker/9:2 Kdump: loaded Not tainted 5.16.0-rc5-autotest-g6441998e2e37 #1
	Workqueue: events_long __ibmvnic_reset [ibmvnic]
	NIP:  c000000000a3c840 LR: c0080000029b5378 CTR: c000000000a3c820
	REGS: c0000000548e37e0 TRAP: 0300   Not tainted  (5.16.0-rc5-autotest-g6441998e2e37)
	MSR:  8000000000009033 &lt;SF,EE,ME,IR,DR,RI,LE&gt;  CR: 28248484  XER: 00000004
	CFAR: c0080000029bdd24 DAR: 0000000000000010 DSISR: 40000000 IRQMASK: 0
	GPR00: c0080000029b55d0 c0000000548e3a80 c0000000028f0200 0000000000000000
	...
	NIP [c000000000a3c840] napi_enable+0x20/0xc0
	LR [c0080000029b5378] __ibmvnic_open+0xf0/0x430 [ibmvnic]
	Call Trace:
	[c0000000548e3a80] [0000000000000006] 0x6 (unreliable)
	[c0000000548e3ab0] [c0080000029b55d0] __ibmvnic_open+0x348/0x430 [ibmvnic]
	[c0000000548e3b40] [c0080000029bcc28] __ibmvnic_reset+0x500/0xdf0 [ibmvnic]
	[c0000000548e3c60] [c000000000176228] process_one_work+0x288/0x570
	[c0000000548e3d00] [c000000000176588] worker_thread+0x78/0x660
	[c0000000548e3da0] [c0000000001822f0] kthread+0x1c0/0x1d0
	[c0000000548e3e10] [c00000000000cf64] ret_from_kernel_thread+0x5c/0x64
	Instruction dump:
	7d2948f8 792307e0 4e800020 60000000 3c4c01eb 384239e0 f821ffd1 39430010
	38a0fff6 e92d1100 f9210028 39200000 &lt;e9030010&gt; f9010020 60420000 e9210020
	---[ end trace 5f8033b08fd27706 ]---</Note>
    </Notes>
    <CVE>CVE-2022-48811</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48811.html</URL>
        <Description>CVE-2022-48811</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227928</URL>
        <Description>SUSE Bug 1227928</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: qedf: Fix refcount issue when LOGO is received during TMF

Hung task call trace was seen during LOGO processing.

[  974.309060] [0000:00:00.0]:[qedf_eh_device_reset:868]: 1:0:2:0: LUN RESET Issued...
[  974.309065] [0000:00:00.0]:[qedf_initiate_tmf:2422]: tm_flags 0x10 sc_cmd 00000000c16b930f op = 0x2a target_id = 0x2 lun=0
[  974.309178] [0000:00:00.0]:[qedf_initiate_tmf:2431]: portid=016900 tm_flags =LUN RESET
[  974.309222] [0000:00:00.0]:[qedf_initiate_tmf:2438]: orig io_req = 00000000ec78df8f xid = 0x180 ref_cnt = 1.
[  974.309625] host1: rport 016900: Received LOGO request while in state Ready
[  974.309627] host1: rport 016900: Delete port
[  974.309642] host1: rport 016900: work event 3
[  974.309644] host1: rport 016900: lld callback ev 3
[  974.313243] [0000:61:00.2]:[qedf_execute_tmf:2383]:1: fcport is uploading, not executing flush.
[  974.313295] [0000:61:00.2]:[qedf_execute_tmf:2400]:1: task mgmt command success...
[  984.031088] INFO: task jbd2/dm-15-8:7645 blocked for more than 120 seconds.
[  984.031136]       Not tainted 4.18.0-305.el8.x86_64 #1

[  984.031166] "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  984.031209] jbd2/dm-15-8    D    0  7645      2 0x80004080
[  984.031212] Call Trace:
[  984.031222]  __schedule+0x2c4/0x700
[  984.031230]  ? unfreeze_partials.isra.83+0x16e/0x1a0
[  984.031233]  ? bit_wait_timeout+0x90/0x90
[  984.031235]  schedule+0x38/0xa0
[  984.031238]  io_schedule+0x12/0x40
[  984.031240]  bit_wait_io+0xd/0x50
[  984.031243]  __wait_on_bit+0x6c/0x80
[  984.031248]  ? free_buffer_head+0x21/0x50
[  984.031251]  out_of_line_wait_on_bit+0x91/0xb0
[  984.031257]  ? init_wait_var_entry+0x50/0x50
[  984.031268]  jbd2_journal_commit_transaction+0x112e/0x19f0 [jbd2]
[  984.031280]  kjournald2+0xbd/0x270 [jbd2]
[  984.031284]  ? finish_wait+0x80/0x80
[  984.031291]  ? commit_timeout+0x10/0x10 [jbd2]
[  984.031294]  kthread+0x116/0x130
[  984.031300]  ? kthread_flush_work_fn+0x10/0x10
[  984.031305]  ret_from_fork+0x1f/0x40

There was a ref count issue when LOGO is received during TMF. This leads to
one of the I/Os hanging with the driver. Fix the ref count.</Note>
    </Notes>
    <CVE>CVE-2022-48823</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48823.html</URL>
        <Description>CVE-2022-48823</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228045</URL>
        <Description>SUSE Bug 1228045</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/vc4: Fix deadlock on DSI device attach error

DSI device attach to DSI host will be done with host device's lock
held.

Un-registering host in "device attach" error path (ex: probe retry)
will result in deadlock with below call trace and non operational
DSI display.

Startup Call trace:
[   35.043036]  rt_mutex_slowlock.constprop.21+0x184/0x1b8
[   35.043048]  mutex_lock_nested+0x7c/0xc8
[   35.043060]  device_del+0x4c/0x3e8
[   35.043075]  device_unregister+0x20/0x40
[   35.043082]  mipi_dsi_remove_device_fn+0x18/0x28
[   35.043093]  device_for_each_child+0x68/0xb0
[   35.043105]  mipi_dsi_host_unregister+0x40/0x90
[   35.043115]  vc4_dsi_host_attach+0xf0/0x120 [vc4]
[   35.043199]  mipi_dsi_attach+0x30/0x48
[   35.043209]  tc358762_probe+0x128/0x164 [tc358762]
[   35.043225]  mipi_dsi_drv_probe+0x28/0x38
[   35.043234]  really_probe+0xc0/0x318
[   35.043244]  __driver_probe_device+0x80/0xe8
[   35.043254]  driver_probe_device+0xb8/0x118
[   35.043263]  __device_attach_driver+0x98/0xe8
[   35.043273]  bus_for_each_drv+0x84/0xd8
[   35.043281]  __device_attach+0xf0/0x150
[   35.043290]  device_initial_probe+0x1c/0x28
[   35.043300]  bus_probe_device+0xa4/0xb0
[   35.043308]  deferred_probe_work_func+0xa0/0xe0
[   35.043318]  process_one_work+0x254/0x700
[   35.043330]  worker_thread+0x4c/0x448
[   35.043339]  kthread+0x19c/0x1a8
[   35.043348]  ret_from_fork+0x10/0x20

Shutdown Call trace:
[  365.565417] Call trace:
[  365.565423]  __switch_to+0x148/0x200
[  365.565452]  __schedule+0x340/0x9c8
[  365.565467]  schedule+0x48/0x110
[  365.565479]  schedule_timeout+0x3b0/0x448
[  365.565496]  wait_for_completion+0xac/0x138
[  365.565509]  __flush_work+0x218/0x4e0
[  365.565523]  flush_work+0x1c/0x28
[  365.565536]  wait_for_device_probe+0x68/0x158
[  365.565550]  device_shutdown+0x24/0x348
[  365.565561]  kernel_restart_prepare+0x40/0x50
[  365.565578]  kernel_restart+0x20/0x70
[  365.565591]  __do_sys_reboot+0x10c/0x220
[  365.565605]  __arm64_sys_reboot+0x2c/0x38
[  365.565619]  invoke_syscall+0x4c/0x110
[  365.565634]  el0_svc_common.constprop.3+0xfc/0x120
[  365.565648]  do_el0_svc+0x2c/0x90
[  365.565661]  el0_svc+0x4c/0xf0
[  365.565671]  el0t_64_sync_handler+0x90/0xb8
[  365.565682]  el0t_64_sync+0x180/0x184</Note>
    </Notes>
    <CVE>CVE-2022-48826</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48826.html</URL>
        <Description>CVE-2022-48826</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227975</URL>
        <Description>SUSE Bug 1227975</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

NFSD: Fix the behavior of READ near OFFSET_MAX

Dan Aloni reports:
&gt; Due to commit 8cfb9015280d ("NFS: Always provide aligned buffers to
&gt; the RPC read layers") on the client, a read of 0xfff is aligned up
&gt; to server rsize of 0x1000.
&gt;
&gt; As a result, in a test where the server has a file of size
&gt; 0x7fffffffffffffff, and the client tries to read from the offset
&gt; 0x7ffffffffffff000, the read causes loff_t overflow in the server
&gt; and it returns an NFS code of EINVAL to the client. The client as
&gt; a result indefinitely retries the request.

The Linux NFS client does not handle NFS?ERR_INVAL, even though all
NFS specifications permit servers to return that status code for a
READ.

Instead of NFS?ERR_INVAL, have out-of-range READ requests succeed
and return a short result. Set the EOF flag in the result to prevent
the client from retrying the READ request. This behavior appears to
be consistent with Solaris NFS servers.

Note that NFSv3 and NFSv4 use u64 offset values on the wire. These
must be converted to loff_t internally before use -- an implicit
type cast is not adequate for this purpose. Otherwise VFS checks
against sb-&gt;s_maxbytes do not work properly.</Note>
    </Notes>
    <CVE>CVE-2022-48827</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48827.html</URL>
        <Description>CVE-2022-48827</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228037</URL>
        <Description>SUSE Bug 1228037</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

NFSD: Fix ia_size underflow

iattr::ia_size is a loff_t, which is a signed 64-bit type. NFSv3 and
NFSv4 both define file size as an unsigned 64-bit type. Thus there
is a range of valid file size values an NFS client can send that is
already larger than Linux can handle.

Currently decode_fattr4() dumps a full u64 value into ia_size. If
that value happens to be larger than S64_MAX, then ia_size
underflows. I'm about to fix up the NFSv3 behavior as well, so let's
catch the underflow in the common code path: nfsd_setattr().</Note>
    </Notes>
    <CVE>CVE-2022-48828</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48828.html</URL>
        <Description>CVE-2022-48828</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228054</URL>
        <Description>SUSE Bug 1228054</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes

iattr::ia_size is a loff_t, so these NFSv3 procedures must be
careful to deal with incoming client size values that are larger
than s64_max without corrupting the value.

Silently capping the value results in storing a different value
than the client passed in which is unexpected behavior, so remove
the min_t() check in decode_sattr3().

Note that RFC 1813 permits only the WRITE procedure to return
NFS3ERR_FBIG. We believe that NFSv3 reference implementations
also return NFS3ERR_FBIG when ia_size is too large.</Note>
    </Notes>
    <CVE>CVE-2022-48829</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48829.html</URL>
        <Description>CVE-2022-48829</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228055</URL>
        <Description>SUSE Bug 1228055</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Input: aiptek - properly check endpoint type

Syzbot reported warning in usb_submit_urb() which is caused by wrong
endpoint type. There was a check for the number of endpoints, but not
for the type of endpoint.

Fix it by replacing old desc.bNumEndpoints check with
usb_find_common_endpoints() helper for finding endpoints

Fail log:

usb 5-1: BOGUS urb xfer, pipe 1 != type 3
WARNING: CPU: 2 PID: 48 at drivers/usb/core/urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502
Modules linked in:
CPU: 2 PID: 48 Comm: kworker/2:2 Not tainted 5.17.0-rc6-syzkaller-00226-g07ebd38a0da2 #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
Workqueue: usb_hub_wq hub_event
...
Call Trace:
 &lt;TASK&gt;
 aiptek_open+0xd5/0x130 drivers/input/tablet/aiptek.c:830
 input_open_device+0x1bb/0x320 drivers/input/input.c:629
 kbd_connect+0xfe/0x160 drivers/tty/vt/keyboard.c:1593</Note>
    </Notes>
    <CVE>CVE-2022-48836</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48836.html</URL>
        <Description>CVE-2022-48836</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227989</URL>
        <Description>SUSE Bug 1227989</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/packet: fix slab-out-of-bounds access in packet_recvmsg()

syzbot found that when an AF_PACKET socket is using PACKET_COPY_THRESH
and mmap operations, tpacket_rcv() is queueing skbs with
garbage in skb-&gt;cb[], triggering a too big copy [1]

Presumably, users of af_packet using mmap() already gets correct
metadata from the mapped buffer, we can simply make sure
to clear 12 bytes that might be copied to user space later.

BUG: KASAN: stack-out-of-bounds in memcpy include/linux/fortify-string.h:225 [inline]
BUG: KASAN: stack-out-of-bounds in packet_recvmsg+0x56c/0x1150 net/packet/af_packet.c:3489
Write of size 165 at addr ffffc9000385fb78 by task syz-executor233/3631

CPU: 0 PID: 3631 Comm: syz-executor233 Not tainted 5.17.0-rc7-syzkaller-02396-g0b3660695e80 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
 print_address_description.constprop.0.cold+0xf/0x336 mm/kasan/report.c:255
 __kasan_report mm/kasan/report.c:442 [inline]
 kasan_report.cold+0x83/0xdf mm/kasan/report.c:459
 check_region_inline mm/kasan/generic.c:183 [inline]
 kasan_check_range+0x13d/0x180 mm/kasan/generic.c:189
 memcpy+0x39/0x60 mm/kasan/shadow.c:66
 memcpy include/linux/fortify-string.h:225 [inline]
 packet_recvmsg+0x56c/0x1150 net/packet/af_packet.c:3489
 sock_recvmsg_nosec net/socket.c:948 [inline]
 sock_recvmsg net/socket.c:966 [inline]
 sock_recvmsg net/socket.c:962 [inline]
 ____sys_recvmsg+0x2c4/0x600 net/socket.c:2632
 ___sys_recvmsg+0x127/0x200 net/socket.c:2674
 __sys_recvmsg+0xe2/0x1a0 net/socket.c:2704
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fdfd5954c29
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 41 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffcf8e71e48 EFLAGS: 00000246 ORIG_RAX: 000000000000002f
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fdfd5954c29
RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000005
RBP: 0000000000000000 R08: 000000000000000d R09: 000000000000000d
R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffcf8e71e60
R13: 00000000000f4240 R14: 000000000000c1ff R15: 00007ffcf8e71e54
 &lt;/TASK&gt;

addr ffffc9000385fb78 is located in stack of task syz-executor233/3631 at offset 32 in frame:
 ____sys_recvmsg+0x0/0x600 include/linux/uio.h:246

this frame has 1 object:
 [32, 160) 'addr'

Memory state around the buggy address:
 ffffc9000385fa80: 00 04 f3 f3 f3 f3 f3 00 00 00 00 00 00 00 00 00
 ffffc9000385fb00: 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00
&gt;ffffc9000385fb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f3
                                                                ^
 ffffc9000385fc00: f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
 ffffc9000385fc80: f1 f1 f1 00 f2 f2 f2 00 f2 f2 f2 00 00 00 00 00
==================================================================</Note>
    </Notes>
    <CVE>CVE-2022-48839</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48839.html</URL>
        <Description>CVE-2022-48839</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227985</URL>
        <Description>SUSE Bug 1227985</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="50">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net-sysfs: add check for netdevice being present to speed_show

When bringing down the netdevice or system shutdown, a panic can be
triggered while accessing the sysfs path because the device is already
removed.

    [  755.549084] mlx5_core 0000:12:00.1: Shutdown was called
    [  756.404455] mlx5_core 0000:12:00.0: Shutdown was called
    ...
    [  757.937260] BUG: unable to handle kernel NULL pointer dereference at           (null)
    [  758.031397] IP: [&lt;ffffffff8ee11acb&gt;] dma_pool_alloc+0x1ab/0x280

    crash&gt; bt
    ...
    PID: 12649  TASK: ffff8924108f2100  CPU: 1   COMMAND: "amsd"
    ...
     #9 [ffff89240e1a38b0] page_fault at ffffffff8f38c778
        [exception RIP: dma_pool_alloc+0x1ab]
        RIP: ffffffff8ee11acb  RSP: ffff89240e1a3968  RFLAGS: 00010046
        RAX: 0000000000000246  RBX: ffff89243d874100  RCX: 0000000000001000
        RDX: 0000000000000000  RSI: 0000000000000246  RDI: ffff89243d874090
        RBP: ffff89240e1a39c0   R8: 000000000001f080   R9: ffff8905ffc03c00
        R10: ffffffffc04680d4  R11: ffffffff8edde9fd  R12: 00000000000080d0
        R13: ffff89243d874090  R14: ffff89243d874080  R15: 0000000000000000
        ORIG_RAX: ffffffffffffffff  CS: 0010  SS: 0018
    #10 [ffff89240e1a39c8] mlx5_alloc_cmd_msg at ffffffffc04680f3 [mlx5_core]
    #11 [ffff89240e1a3a18] cmd_exec at ffffffffc046ad62 [mlx5_core]
    #12 [ffff89240e1a3ab8] mlx5_cmd_exec at ffffffffc046b4fb [mlx5_core]
    #13 [ffff89240e1a3ae8] mlx5_core_access_reg at ffffffffc0475434 [mlx5_core]
    #14 [ffff89240e1a3b40] mlx5e_get_fec_caps at ffffffffc04a7348 [mlx5_core]
    #15 [ffff89240e1a3bb0] get_fec_supported_advertised at ffffffffc04992bf [mlx5_core]
    #16 [ffff89240e1a3c08] mlx5e_get_link_ksettings at ffffffffc049ab36 [mlx5_core]
    #17 [ffff89240e1a3ce8] __ethtool_get_link_ksettings at ffffffff8f25db46
    #18 [ffff89240e1a3d48] speed_show at ffffffff8f277208
    #19 [ffff89240e1a3dd8] dev_attr_show at ffffffff8f0b70e3
    #20 [ffff89240e1a3df8] sysfs_kf_seq_show at ffffffff8eedbedf
    #21 [ffff89240e1a3e18] kernfs_seq_show at ffffffff8eeda596
    #22 [ffff89240e1a3e28] seq_read at ffffffff8ee76d10
    #23 [ffff89240e1a3e98] kernfs_fop_read at ffffffff8eedaef5
    #24 [ffff89240e1a3ed8] vfs_read at ffffffff8ee4e3ff
    #25 [ffff89240e1a3f08] sys_read at ffffffff8ee4f27f
    #26 [ffff89240e1a3f50] system_call_fastpath at ffffffff8f395f92

    crash&gt; net_device.state ffff89443b0c0000
      state = 0x5  (__LINK_STATE_START| __LINK_STATE_NOCARRIER)

To prevent this scenario, we also make sure that the netdevice is present.</Note>
    </Notes>
    <CVE>CVE-2022-48850</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48850.html</URL>
        <Description>CVE-2022-48850</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228071</URL>
        <Description>SUSE Bug 1228071</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="51">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

sctp: fix kernel-infoleak for SCTP sockets

syzbot reported a kernel infoleak [1] of 4 bytes.

After analysis, it turned out r-&gt;idiag_expires is not initialized
if inet_sctp_diag_fill() calls inet_diag_msg_common_fill()

Make sure to clear idiag_timer/idiag_retrans/idiag_expires
and let inet_diag_msg_sctpasoc_fill() fill them again if needed.

[1]

BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:121 [inline]
BUG: KMSAN: kernel-infoleak in copyout lib/iov_iter.c:154 [inline]
BUG: KMSAN: kernel-infoleak in _copy_to_iter+0x6ef/0x25a0 lib/iov_iter.c:668
 instrument_copy_to_user include/linux/instrumented.h:121 [inline]
 copyout lib/iov_iter.c:154 [inline]
 _copy_to_iter+0x6ef/0x25a0 lib/iov_iter.c:668
 copy_to_iter include/linux/uio.h:162 [inline]
 simple_copy_to_iter+0xf3/0x140 net/core/datagram.c:519
 __skb_datagram_iter+0x2d5/0x11b0 net/core/datagram.c:425
 skb_copy_datagram_iter+0xdc/0x270 net/core/datagram.c:533
 skb_copy_datagram_msg include/linux/skbuff.h:3696 [inline]
 netlink_recvmsg+0x669/0x1c80 net/netlink/af_netlink.c:1977
 sock_recvmsg_nosec net/socket.c:948 [inline]
 sock_recvmsg net/socket.c:966 [inline]
 __sys_recvfrom+0x795/0xa10 net/socket.c:2097
 __do_sys_recvfrom net/socket.c:2115 [inline]
 __se_sys_recvfrom net/socket.c:2111 [inline]
 __x64_sys_recvfrom+0x19d/0x210 net/socket.c:2111
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82
 entry_SYSCALL_64_after_hwframe+0x44/0xae

Uninit was created at:
 slab_post_alloc_hook mm/slab.h:737 [inline]
 slab_alloc_node mm/slub.c:3247 [inline]
 __kmalloc_node_track_caller+0xe0c/0x1510 mm/slub.c:4975
 kmalloc_reserve net/core/skbuff.c:354 [inline]
 __alloc_skb+0x545/0xf90 net/core/skbuff.c:426
 alloc_skb include/linux/skbuff.h:1158 [inline]
 netlink_dump+0x3e5/0x16c0 net/netlink/af_netlink.c:2248
 __netlink_dump_start+0xcf8/0xe90 net/netlink/af_netlink.c:2373
 netlink_dump_start include/linux/netlink.h:254 [inline]
 inet_diag_handler_cmd+0x2e7/0x400 net/ipv4/inet_diag.c:1341
 sock_diag_rcv_msg+0x24a/0x620
 netlink_rcv_skb+0x40c/0x7e0 net/netlink/af_netlink.c:2494
 sock_diag_rcv+0x63/0x80 net/core/sock_diag.c:277
 netlink_unicast_kernel net/netlink/af_netlink.c:1317 [inline]
 netlink_unicast+0x1093/0x1360 net/netlink/af_netlink.c:1343
 netlink_sendmsg+0x14d9/0x1720 net/netlink/af_netlink.c:1919
 sock_sendmsg_nosec net/socket.c:705 [inline]
 sock_sendmsg net/socket.c:725 [inline]
 sock_write_iter+0x594/0x690 net/socket.c:1061
 do_iter_readv_writev+0xa7f/0xc70
 do_iter_write+0x52c/0x1500 fs/read_write.c:851
 vfs_writev fs/read_write.c:924 [inline]
 do_writev+0x645/0xe00 fs/read_write.c:967
 __do_sys_writev fs/read_write.c:1040 [inline]
 __se_sys_writev fs/read_write.c:1037 [inline]
 __x64_sys_writev+0xe5/0x120 fs/read_write.c:1037
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82
 entry_SYSCALL_64_after_hwframe+0x44/0xae

Bytes 68-71 of 2508 are uninitialized
Memory access of size 2508 starts at ffff888114f9b000
Data copied to user address 00007f7fe09ff2e0

CPU: 1 PID: 3478 Comm: syz-executor306 Not tainted 5.17.0-rc4-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011</Note>
    </Notes>
    <CVE>CVE-2022-48855</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48855.html</URL>
        <Description>CVE-2022-48855</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228003</URL>
        <Description>SUSE Bug 1228003</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="52">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

NFC: port100: fix use-after-free in port100_send_complete

Syzbot reported UAF in port100_send_complete(). The root case is in
missing usb_kill_urb() calls on error handling path of -&gt;probe function.

port100_send_complete() accesses devm allocated memory which will be
freed on probe failure. We should kill this urbs before returning an
error from probe function to prevent reported use-after-free

Fail log:

BUG: KASAN: use-after-free in port100_send_complete+0x16e/0x1a0 drivers/nfc/port100.c:935
Read of size 1 at addr ffff88801bb59540 by task ksoftirqd/2/26
...
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
 print_address_description.constprop.0.cold+0x8d/0x303 mm/kasan/report.c:255
 __kasan_report mm/kasan/report.c:442 [inline]
 kasan_report.cold+0x83/0xdf mm/kasan/report.c:459
 port100_send_complete+0x16e/0x1a0 drivers/nfc/port100.c:935
 __usb_hcd_giveback_urb+0x2b0/0x5c0 drivers/usb/core/hcd.c:1670

...

Allocated by task 1255:
 kasan_save_stack+0x1e/0x40 mm/kasan/common.c:38
 kasan_set_track mm/kasan/common.c:45 [inline]
 set_alloc_info mm/kasan/common.c:436 [inline]
 ____kasan_kmalloc mm/kasan/common.c:515 [inline]
 ____kasan_kmalloc mm/kasan/common.c:474 [inline]
 __kasan_kmalloc+0xa6/0xd0 mm/kasan/common.c:524
 alloc_dr drivers/base/devres.c:116 [inline]
 devm_kmalloc+0x96/0x1d0 drivers/base/devres.c:823
 devm_kzalloc include/linux/device.h:209 [inline]
 port100_probe+0x8a/0x1320 drivers/nfc/port100.c:1502

Freed by task 1255:
 kasan_save_stack+0x1e/0x40 mm/kasan/common.c:38
 kasan_set_track+0x21/0x30 mm/kasan/common.c:45
 kasan_set_free_info+0x20/0x30 mm/kasan/generic.c:370
 ____kasan_slab_free mm/kasan/common.c:366 [inline]
 ____kasan_slab_free+0xff/0x140 mm/kasan/common.c:328
 kasan_slab_free include/linux/kasan.h:236 [inline]
 __cache_free mm/slab.c:3437 [inline]
 kfree+0xf8/0x2b0 mm/slab.c:3794
 release_nodes+0x112/0x1a0 drivers/base/devres.c:501
 devres_release_all+0x114/0x190 drivers/base/devres.c:530
 really_probe+0x626/0xcc0 drivers/base/dd.c:670</Note>
    </Notes>
    <CVE>CVE-2022-48857</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48857.html</URL>
        <Description>CVE-2022-48857</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228005</URL>
        <Description>SUSE Bug 1228005</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="53">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ethernet: Fix error handling in xemaclite_of_probe

This node pointer is returned by of_parse_phandle() with refcount
incremented in this function. Calling of_node_put() to avoid the
refcount leak. As the remove function do.</Note>
    </Notes>
    <CVE>CVE-2022-48860</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48860.html</URL>
        <Description>CVE-2022-48860</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228008</URL>
        <Description>SUSE Bug 1228008</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="54">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mISDN: Fix memory leak in dsp_pipeline_build()

dsp_pipeline_build() allocates dup pointer by kstrdup(cfg),
but then it updates dup variable by strsep(&amp;dup, "|").
As a result when it calls kfree(dup), the dup variable contains NULL.

Found by Linux Driver Verification project (linuxtesting.org) with SVACE.</Note>
    </Notes>
    <CVE>CVE-2022-48863</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48863.html</URL>
        <Description>CVE-2022-48863</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228063</URL>
        <Description>SUSE Bug 1228063</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="55">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

Due to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability.

We recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8.

</Note>
    </Notes>
    <CVE>CVE-2023-4244</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-4244.html</URL>
        <Description>CVE-2023-4244</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215420</URL>
        <Description>SUSE Bug 1215420</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215424</URL>
        <Description>SUSE Bug 1215424</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="56">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: prevent mss overflow in skb_segment()

Once again syzbot is able to crash the kernel in skb_segment() [1]

GSO_BY_FRAGS is a forbidden value, but unfortunately the following
computation in skb_segment() can reach it quite easily :

	mss = mss * partial_segs;

65535 = 3 * 5 * 17 * 257, so many initial values of mss can lead to
a bad final result.

Make sure to limit segmentation so that the new mss value is smaller
than GSO_BY_FRAGS.

[1]

general protection fault, probably for non-canonical address 0xdffffc000000000e: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000070-0x0000000000000077]
CPU: 1 PID: 5079 Comm: syz-executor993 Not tainted 6.7.0-rc4-syzkaller-00141-g1ae4cd3cbdd0 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023
RIP: 0010:skb_segment+0x181d/0x3f30 net/core/skbuff.c:4551
Code: 83 e3 02 e9 fb ed ff ff e8 90 68 1c f9 48 8b 84 24 f8 00 00 00 48 8d 78 70 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 &lt;0f&gt; b6 04 02 84 c0 74 08 3c 03 0f 8e 8a 21 00 00 48 8b 84 24 f8 00
RSP: 0018:ffffc900043473d0 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: 0000000000010046 RCX: ffffffff886b1597
RDX: 000000000000000e RSI: ffffffff886b2520 RDI: 0000000000000070
RBP: ffffc90004347578 R08: 0000000000000005 R09: 000000000000ffff
R10: 000000000000ffff R11: 0000000000000002 R12: ffff888063202ac0
R13: 0000000000010000 R14: 000000000000ffff R15: 0000000000000046
FS: 0000555556e7e380(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020010000 CR3: 0000000027ee2000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
&lt;TASK&gt;
udp6_ufo_fragment+0xa0e/0xd00 net/ipv6/udp_offload.c:109
ipv6_gso_segment+0x534/0x17e0 net/ipv6/ip6_offload.c:120
skb_mac_gso_segment+0x290/0x610 net/core/gso.c:53
__skb_gso_segment+0x339/0x710 net/core/gso.c:124
skb_gso_segment include/net/gso.h:83 [inline]
validate_xmit_skb+0x36c/0xeb0 net/core/dev.c:3626
__dev_queue_xmit+0x6f3/0x3d60 net/core/dev.c:4338
dev_queue_xmit include/linux/netdevice.h:3134 [inline]
packet_xmit+0x257/0x380 net/packet/af_packet.c:276
packet_snd net/packet/af_packet.c:3087 [inline]
packet_sendmsg+0x24c6/0x5220 net/packet/af_packet.c:3119
sock_sendmsg_nosec net/socket.c:730 [inline]
__sock_sendmsg+0xd5/0x180 net/socket.c:745
__sys_sendto+0x255/0x340 net/socket.c:2190
__do_sys_sendto net/socket.c:2202 [inline]
__se_sys_sendto net/socket.c:2198 [inline]
__x64_sys_sendto+0xe0/0x1b0 net/socket.c:2198
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0x40/0x110 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x63/0x6b
RIP: 0033:0x7f8692032aa9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 d1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fff8d685418 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f8692032aa9
RDX: 0000000000010048 RSI: 00000000200000c0 RDI: 0000000000000003
RBP: 00000000000f4240 R08: 0000000020000540 R09: 0000000000000014
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff8d685480
R13: 0000000000000001 R14: 00007fff8d685480 R15: 0000000000000003
&lt;/TASK&gt;
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:skb_segment+0x181d/0x3f30 net/core/skbuff.c:4551
Code: 83 e3 02 e9 fb ed ff ff e8 90 68 1c f9 48 8b 84 24 f8 00 00 00 48 8d 78 70 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 &lt;0f&gt; b6 04 02 84 c0 74 08 3c 03 0f 8e 8a 21 00 00 48 8b 84 24 f8 00
RSP: 0018:ffffc900043473d0 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: 0000000000010046 RCX: ffffffff886b1597
RDX: 000000000000000e RSI: ffffffff886b2520 RDI: 0000000000000070
RBP: ffffc90004347578 R0
---truncated---</Note>
    </Notes>
    <CVE>CVE-2023-52435</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52435.html</URL>
        <Description>CVE-2023-52435</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1220138</URL>
        <Description>SUSE Bug 1220138</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="57">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nfc: nci: assert requested protocol is valid

The protocol is used in a bit mask to determine if the protocol is
supported. Assert the provided protocol is less than the maximum
defined so it doesn't potentially perform a shift-out-of-bounds and
provide a clearer error for undefined protocols vs unsupported ones.</Note>
    </Notes>
    <CVE>CVE-2023-52507</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52507.html</URL>
        <Description>CVE-2023-52507</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1220833</URL>
        <Description>SUSE Bug 1220833</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="58">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()

Fix an array-index-out-of-bounds read in ath9k_htc_txstatus(). The bug
occurs when txs-&gt;cnt, data from a URB provided by a USB device, is
bigger than the size of the array txs-&gt;txstatus, which is
HTC_MAX_TX_STATUS. WARN_ON() already checks it, but there is no bug
handling code after the check. Make the function return if that is the
case.

Found by a modified version of syzkaller.

UBSAN: array-index-out-of-bounds in htc_drv_txrx.c
index 13 is out of range for type '__wmi_event_txstatus [12]'
Call Trace:
 ath9k_htc_txstatus
 ath9k_wmi_event_tasklet
 tasklet_action_common
 __do_softirq
 irq_exit_rxu
 sysvec_apic_timer_interrupt</Note>
    </Notes>
    <CVE>CVE-2023-52594</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52594.html</URL>
        <Description>CVE-2023-52594</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221045</URL>
        <Description>SUSE Bug 1221045</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="59">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

crypto: scomp - fix req-&gt;dst buffer overflow

The req-&gt;dst buffer size should be checked before copying from the
scomp_scratch-&gt;dst to avoid req-&gt;dst buffer overflow problem.</Note>
    </Notes>
    <CVE>CVE-2023-52612</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52612.html</URL>
        <Description>CVE-2023-52612</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221616</URL>
        <Description>SUSE Bug 1221616</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="60">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

hwrng: core - Fix page fault dead lock on mmap-ed hwrng

There is a dead-lock in the hwrng device read path.  This triggers
when the user reads from /dev/hwrng into memory also mmap-ed from
/dev/hwrng.  The resulting page fault triggers a recursive read
which then dead-locks.

Fix this by using a stack buffer when calling copy_to_user.</Note>
    </Notes>
    <CVE>CVE-2023-52615</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52615.html</URL>
        <Description>CVE-2023-52615</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221614</URL>
        <Description>SUSE Bug 1221614</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="61">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

pstore/ram: Fix crash when setting number of cpus to an odd number

When the number of cpu cores is adjusted to 7 or other odd numbers,
the zone size will become an odd number.
The address of the zone will become:
    addr of zone0 = BASE
    addr of zone1 = BASE + zone_size
    addr of zone2 = BASE + zone_size*2
    ...
The address of zone1/3/5/7 will be mapped to non-alignment va.
Eventually crashes will occur when accessing these va.

So, use ALIGN_DOWN() to make sure the zone size is even
to avoid this bug.</Note>
    </Notes>
    <CVE>CVE-2023-52619</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52619.html</URL>
        <Description>CVE-2023-52619</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221618</URL>
        <Description>SUSE Bug 1221618</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="62">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: Fix a suspicious RCU usage warning

I received the following warning while running cthon against an ontap
server running pNFS:

[   57.202521] =============================
[   57.202522] WARNING: suspicious RCU usage
[   57.202523] 6.7.0-rc3-g2cc14f52aeb7 #41492 Not tainted
[   57.202525] -----------------------------
[   57.202525] net/sunrpc/xprtmultipath.c:349 RCU-list traversed in non-reader section!!
[   57.202527]
               other info that might help us debug this:

[   57.202528]
               rcu_scheduler_active = 2, debug_locks = 1
[   57.202529] no locks held by test5/3567.
[   57.202530]
               stack backtrace:
[   57.202532] CPU: 0 PID: 3567 Comm: test5 Not tainted 6.7.0-rc3-g2cc14f52aeb7 #41492 5b09971b4965c0aceba19f3eea324a4a806e227e
[   57.202534] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS unknown 2/2/2022
[   57.202536] Call Trace:
[   57.202537]  &lt;TASK&gt;
[   57.202540]  dump_stack_lvl+0x77/0xb0
[   57.202551]  lockdep_rcu_suspicious+0x154/0x1a0
[   57.202556]  rpc_xprt_switch_has_addr+0x17c/0x190 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]
[   57.202596]  rpc_clnt_setup_test_and_add_xprt+0x50/0x180 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]
[   57.202621]  ? rpc_clnt_add_xprt+0x254/0x300 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]
[   57.202646]  rpc_clnt_add_xprt+0x27a/0x300 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]
[   57.202671]  ? __pfx_rpc_clnt_setup_test_and_add_xprt+0x10/0x10 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]
[   57.202696]  nfs4_pnfs_ds_connect+0x345/0x760 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]
[   57.202728]  ? __pfx_nfs4_test_session_trunk+0x10/0x10 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]
[   57.202754]  nfs4_fl_prepare_ds+0x75/0xc0 [nfs_layout_nfsv41_files e3a4187f18ae8a27b630f9feae6831b584a9360a]
[   57.202760]  filelayout_write_pagelist+0x4a/0x200 [nfs_layout_nfsv41_files e3a4187f18ae8a27b630f9feae6831b584a9360a]
[   57.202765]  pnfs_generic_pg_writepages+0xbe/0x230 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]
[   57.202788]  __nfs_pageio_add_request+0x3fd/0x520 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]
[   57.202813]  nfs_pageio_add_request+0x18b/0x390 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]
[   57.202831]  nfs_do_writepage+0x116/0x1e0 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]
[   57.202849]  nfs_writepages_callback+0x13/0x30 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]
[   57.202866]  write_cache_pages+0x265/0x450
[   57.202870]  ? __pfx_nfs_writepages_callback+0x10/0x10 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]
[   57.202891]  nfs_writepages+0x141/0x230 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]
[   57.202913]  do_writepages+0xd2/0x230
[   57.202917]  ? filemap_fdatawrite_wbc+0x5c/0x80
[   57.202921]  filemap_fdatawrite_wbc+0x67/0x80
[   57.202924]  filemap_write_and_wait_range+0xd9/0x170
[   57.202930]  nfs_wb_all+0x49/0x180 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]
[   57.202947]  nfs4_file_flush+0x72/0xb0 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]
[   57.202969]  __se_sys_close+0x46/0xd0
[   57.202972]  do_syscall_64+0x68/0x100
[   57.202975]  ? do_syscall_64+0x77/0x100
[   57.202976]  ? do_syscall_64+0x77/0x100
[   57.202979]  entry_SYSCALL_64_after_hwframe+0x6e/0x76
[   57.202982] RIP: 0033:0x7fe2b12e4a94
[   57.202985] Code: 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 80 3d d5 18 0e 00 00 74 13 b8 03 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 44 c3 0f 1f 00 48 83 ec 18 89 7c 24 0c e8 c3
[   57.202987] RSP: 002b:00007ffe857ddb38 EFLAGS: 00000202 ORIG_RAX: 0000000000000003
[   57.202989] RAX: ffffffffffffffda RBX: 00007ffe857dfd68 RCX: 00007fe2b12e4a94
[   57.202991] RDX: 0000000000002000 RSI: 00007ffe857ddc40 RDI: 0000000000000003
[   57.202992] RBP: 00007ffe857dfc50 R08: 7fffffffffffffff R09: 0000000065650f49
[   57.202993] R10: 00007f
---truncated---</Note>
    </Notes>
    <CVE>CVE-2023-52623</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52623.html</URL>
        <Description>CVE-2023-52623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222060</URL>
        <Description>SUSE Bug 1222060</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="63">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

crypto: s390/aes - Fix buffer overread in CTR mode

When processing the last block, the s390 ctr code will always read
a whole block, even if there isn't a whole block of data left.  Fix
this by using the actual length left and copy it into a buffer first
for processing.</Note>
    </Notes>
    <CVE>CVE-2023-52669</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52669.html</URL>
        <Description>CVE-2023-52669</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224637</URL>
        <Description>SUSE Bug 1224637</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="64">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ACPI: LPIT: Avoid u32 multiplication overflow

In lpit_update_residency() there is a possibility of overflow
in multiplication, if tsc_khz is large enough (&gt; UINT_MAX/1000).

Change multiplication to mul_u32_u32().

Found by Linux Verification Center (linuxtesting.org) with SVACE.</Note>
    </Notes>
    <CVE>CVE-2023-52683</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52683.html</URL>
        <Description>CVE-2023-52683</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224627</URL>
        <Description>SUSE Bug 1224627</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="65">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ACPI: video: check for error while searching for backlight device parent

If acpi_get_parent() called in acpi_video_dev_register_backlight()
fails, for example, because acpi_ut_acquire_mutex() fails inside
acpi_get_parent), this can lead to incorrect (uninitialized)
acpi_parent handle being passed to acpi_get_pci_dev() for detecting
the parent pci device.

Check acpi_get_parent() result and set parent device only in case of success.

Found by Linux Verification Center (linuxtesting.org) with SVACE.</Note>
    </Notes>
    <CVE>CVE-2023-52693</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52693.html</URL>
        <Description>CVE-2023-52693</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224686</URL>
        <Description>SUSE Bug 1224686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="66">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ice: Do not use WQ_MEM_RECLAIM flag for workqueue

When both ice and the irdma driver are loaded, a warning in
check_flush_dependency is being triggered. This is due to ice driver
workqueue being allocated with the WQ_MEM_RECLAIM flag and the irdma one
is not.

According to kernel documentation, this flag should be set if the
workqueue will be involved in the kernel's memory reclamation flow.
Since it is not, there is no need for the ice driver's WQ to have this
flag set so remove it.

Example trace:

[  +0.000004] workqueue: WQ_MEM_RECLAIM ice:ice_service_task [ice] is flushing !WQ_MEM_RECLAIM infiniband:0x0
[  +0.000139] WARNING: CPU: 0 PID: 728 at kernel/workqueue.c:2632 check_flush_dependency+0x178/0x1a0
[  +0.000011] Modules linked in: bonding tls xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_reject_ipv4 nft_compat nft_cha
in_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nf_tables nfnetlink bridge stp llc rfkill vfat fat intel_rapl_msr intel
_rapl_common isst_if_common skx_edac nfit libnvdimm x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm irqbypass crct1
0dif_pclmul crc32_pclmul ghash_clmulni_intel rapl intel_cstate rpcrdma sunrpc rdma_ucm ib_srpt ib_isert iscsi_target_mod target_
core_mod ib_iser libiscsi scsi_transport_iscsi rdma_cm ib_cm iw_cm iTCO_wdt iTCO_vendor_support ipmi_ssif irdma mei_me ib_uverbs
ib_core intel_uncore joydev pcspkr i2c_i801 acpi_ipmi mei lpc_ich i2c_smbus intel_pch_thermal ioatdma ipmi_si acpi_power_meter
acpi_pad xfs libcrc32c sd_mod t10_pi crc64_rocksoft crc64 sg ahci ixgbe libahci ice i40e igb crc32c_intel mdio i2c_algo_bit liba
ta dca wmi dm_mirror dm_region_hash dm_log dm_mod ipmi_devintf ipmi_msghandler fuse
[  +0.000161]  [last unloaded: bonding]
[  +0.000006] CPU: 0 PID: 728 Comm: kworker/0:2 Tainted: G S                 6.2.0-rc2_next-queue-13jan-00458-gc20aabd57164 #1
[  +0.000006] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0010.010620200716 01/06/2020
[  +0.000003] Workqueue: ice ice_service_task [ice]
[  +0.000127] RIP: 0010:check_flush_dependency+0x178/0x1a0
[  +0.000005] Code: 89 8e 02 01 e8 49 3d 40 00 49 8b 55 18 48 8d 8d d0 00 00 00 48 8d b3 d0 00 00 00 4d 89 e0 48 c7 c7 e0 3b 08
9f e8 bb d3 07 01 &lt;0f&gt; 0b e9 be fe ff ff 80 3d 24 89 8e 02 00 0f 85 6b ff ff ff e9 06
[  +0.000004] RSP: 0018:ffff88810a39f990 EFLAGS: 00010282
[  +0.000005] RAX: 0000000000000000 RBX: ffff888141bc2400 RCX: 0000000000000000
[  +0.000004] RDX: 0000000000000001 RSI: dffffc0000000000 RDI: ffffffffa1213a80
[  +0.000003] RBP: ffff888194bf3400 R08: ffffed117b306112 R09: ffffed117b306112
[  +0.000003] R10: ffff888bd983088b R11: ffffed117b306111 R12: 0000000000000000
[  +0.000003] R13: ffff888111f84d00 R14: ffff88810a3943ac R15: ffff888194bf3400
[  +0.000004] FS:  0000000000000000(0000) GS:ffff888bd9800000(0000) knlGS:0000000000000000
[  +0.000003] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  +0.000003] CR2: 000056035b208b60 CR3: 000000017795e005 CR4: 00000000007706f0
[  +0.000003] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  +0.000003] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  +0.000002] PKRU: 55555554
[  +0.000003] Call Trace:
[  +0.000002]  &lt;TASK&gt;
[  +0.000003]  __flush_workqueue+0x203/0x840
[  +0.000006]  ? mutex_unlock+0x84/0xd0
[  +0.000008]  ? __pfx_mutex_unlock+0x10/0x10
[  +0.000004]  ? __pfx___flush_workqueue+0x10/0x10
[  +0.000006]  ? mutex_lock+0xa3/0xf0
[  +0.000005]  ib_cache_cleanup_one+0x39/0x190 [ib_core]
[  +0.000174]  __ib_unregister_device+0x84/0xf0 [ib_core]
[  +0.000094]  ib_unregister_device+0x25/0x30 [ib_core]
[  +0.000093]  irdma_ib_unregister_device+0x97/0xc0 [irdma]
[  +0.000064]  ? __pfx_irdma_ib_unregister_device+0x10/0x10 [irdma]
[  +0.000059]  ? up_write+0x5c/0x90
[  +0.000005]  irdma_remove+0x36/0x90 [irdma]
[  +0.000062]  auxiliary_bus_remove+0x32/0x50
[  +0.000007]  device_r
---truncated---</Note>
    </Notes>
    <CVE>CVE-2023-52743</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52743.html</URL>
        <Description>CVE-2023-52743</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225003</URL>
        <Description>SUSE Bug 1225003</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="67">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Avoid NULL dereference of timing generator

[Why &amp; How]
Check whether assigned timing generator is NULL or not before
accessing its funcs to prevent NULL dereference.</Note>
    </Notes>
    <CVE>CVE-2023-52753</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52753.html</URL>
        <Description>CVE-2023-52753</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225478</URL>
        <Description>SUSE Bug 1225478</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="68">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL

In certain types of chips, such as VEGA20, reading the amdgpu_regs_smc file could result in an abnormal null pointer access when the smc_rreg pointer is NULL. Below are the steps to reproduce this issue and the corresponding exception log:

1. Navigate to the directory: /sys/kernel/debug/dri/0
2. Execute command: cat amdgpu_regs_smc
3. Exception Log::
[4005007.702554] BUG: kernel NULL pointer dereference, address: 0000000000000000
[4005007.702562] #PF: supervisor instruction fetch in kernel mode
[4005007.702567] #PF: error_code(0x0010) - not-present page
[4005007.702570] PGD 0 P4D 0
[4005007.702576] Oops: 0010 [#1] SMP NOPTI
[4005007.702581] CPU: 4 PID: 62563 Comm: cat Tainted: G           OE     5.15.0-43-generic #46-Ubunt       u
[4005007.702590] RIP: 0010:0x0
[4005007.702598] Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.
[4005007.702600] RSP: 0018:ffffa82b46d27da0 EFLAGS: 00010206
[4005007.702605] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffa82b46d27e68
[4005007.702609] RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff9940656e0000
[4005007.702612] RBP: ffffa82b46d27dd8 R08: 0000000000000000 R09: ffff994060c07980
[4005007.702615] R10: 0000000000020000 R11: 0000000000000000 R12: 00007f5e06753000
[4005007.702618] R13: ffff9940656e0000 R14: ffffa82b46d27e68 R15: 00007f5e06753000
[4005007.702622] FS:  00007f5e0755b740(0000) GS:ffff99479d300000(0000) knlGS:0000000000000000
[4005007.702626] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[4005007.702629] CR2: ffffffffffffffd6 CR3: 00000003253fc000 CR4: 00000000003506e0
[4005007.702633] Call Trace:
[4005007.702636]  &lt;TASK&gt;
[4005007.702640]  amdgpu_debugfs_regs_smc_read+0xb0/0x120 [amdgpu]
[4005007.703002]  full_proxy_read+0x5c/0x80
[4005007.703011]  vfs_read+0x9f/0x1a0
[4005007.703019]  ksys_read+0x67/0xe0
[4005007.703023]  __x64_sys_read+0x19/0x20
[4005007.703028]  do_syscall_64+0x5c/0xc0
[4005007.703034]  ? do_user_addr_fault+0x1e3/0x670
[4005007.703040]  ? exit_to_user_mode_prepare+0x37/0xb0
[4005007.703047]  ? irqentry_exit_to_user_mode+0x9/0x20
[4005007.703052]  ? irqentry_exit+0x19/0x30
[4005007.703057]  ? exc_page_fault+0x89/0x160
[4005007.703062]  ? asm_exc_page_fault+0x8/0x30
[4005007.703068]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[4005007.703075] RIP: 0033:0x7f5e07672992
[4005007.703079] Code: c0 e9 b2 fe ff ff 50 48 8d 3d fa b2 0c 00 e8 c5 1d 02 00 0f 1f 44 00 00 f3 0f        1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 e       c 28 48 89 54 24
[4005007.703083] RSP: 002b:00007ffe03097898 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[4005007.703088] RAX: ffffffffffffffda RBX: 0000000000020000 RCX: 00007f5e07672992
[4005007.703091] RDX: 0000000000020000 RSI: 00007f5e06753000 RDI: 0000000000000003
[4005007.703094] RBP: 00007f5e06753000 R08: 00007f5e06752010 R09: 00007f5e06752010
[4005007.703096] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000022000
[4005007.703099] R13: 0000000000000003 R14: 0000000000020000 R15: 0000000000020000
[4005007.703105]  &lt;/TASK&gt;
[4005007.703107] Modules linked in: nf_tables libcrc32c nfnetlink algif_hash af_alg binfmt_misc nls_       iso8859_1 ipmi_ssif ast intel_rapl_msr intel_rapl_common drm_vram_helper drm_ttm_helper amd64_edac t       tm edac_mce_amd kvm_amd ccp mac_hid k10temp kvm acpi_ipmi ipmi_si rapl sch_fq_codel ipmi_devintf ipm       i_msghandler msr parport_pc ppdev lp parport mtd pstore_blk efi_pstore ramoops pstore_zone reed_solo       mon ip_tables x_tables autofs4 ib_uverbs ib_core amdgpu(OE) amddrm_ttm_helper(OE) amdttm(OE) iommu_v       2 amd_sched(OE) amdkcl(OE) drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops cec rc_core        drm igb ahci xhci_pci libahci i2c_piix4 i2c_algo_bit xhci_pci_renesas dca
[4005007.703184] CR2: 0000000000000000
[4005007.703188] ---[ en
---truncated---</Note>
    </Notes>
    <CVE>CVE-2023-52817</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52817.html</URL>
        <Description>CVE-2023-52817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225569</URL>
        <Description>SUSE Bug 1225569</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="69">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7

For pptable structs that use flexible array sizes, use flexible arrays.</Note>
    </Notes>
    <CVE>CVE-2023-52818</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52818.html</URL>
        <Description>CVE-2023-52818</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225530</URL>
        <Description>SUSE Bug 1225530</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="70">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga

For pptable structs that use flexible array sizes, use flexible arrays.</Note>
    </Notes>
    <CVE>CVE-2023-52819</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52819.html</URL>
        <Description>CVE-2023-52819</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225532</URL>
        <Description>SUSE Bug 1225532</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="71">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: Fix UAF in svc_tcp_listen_data_ready()

After the listener svc_sock is freed, and before invoking svc_tcp_accept()
for the established child sock, there is a window that the newsock
retaining a freed listener svc_sock in sk_user_data which cloning from
parent. In the race window, if data is received on the newsock, we will
observe use-after-free report in svc_tcp_listen_data_ready().

Reproduce by two tasks:

1. while :; do rpc.nfsd 0 ; rpc.nfsd; done
2. while :; do echo "" | ncat -4 127.0.0.1 2049 ; done

KASAN report:

  ==================================================================
  BUG: KASAN: slab-use-after-free in svc_tcp_listen_data_ready+0x1cf/0x1f0 [sunrpc]
  Read of size 8 at addr ffff888139d96228 by task nc/102553
  CPU: 7 PID: 102553 Comm: nc Not tainted 6.3.0+ #18
  Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
  Call Trace:
   &lt;IRQ&gt;
   dump_stack_lvl+0x33/0x50
   print_address_description.constprop.0+0x27/0x310
   print_report+0x3e/0x70
   kasan_report+0xae/0xe0
   svc_tcp_listen_data_ready+0x1cf/0x1f0 [sunrpc]
   tcp_data_queue+0x9f4/0x20e0
   tcp_rcv_established+0x666/0x1f60
   tcp_v4_do_rcv+0x51c/0x850
   tcp_v4_rcv+0x23fc/0x2e80
   ip_protocol_deliver_rcu+0x62/0x300
   ip_local_deliver_finish+0x267/0x350
   ip_local_deliver+0x18b/0x2d0
   ip_rcv+0x2fb/0x370
   __netif_receive_skb_one_core+0x166/0x1b0
   process_backlog+0x24c/0x5e0
   __napi_poll+0xa2/0x500
   net_rx_action+0x854/0xc90
   __do_softirq+0x1bb/0x5de
   do_softirq+0xcb/0x100
   &lt;/IRQ&gt;
   &lt;TASK&gt;
   ...
   &lt;/TASK&gt;

  Allocated by task 102371:
   kasan_save_stack+0x1e/0x40
   kasan_set_track+0x21/0x30
   __kasan_kmalloc+0x7b/0x90
   svc_setup_socket+0x52/0x4f0 [sunrpc]
   svc_addsock+0x20d/0x400 [sunrpc]
   __write_ports_addfd+0x209/0x390 [nfsd]
   write_ports+0x239/0x2c0 [nfsd]
   nfsctl_transaction_write+0xac/0x110 [nfsd]
   vfs_write+0x1c3/0xae0
   ksys_write+0xed/0x1c0
   do_syscall_64+0x38/0x90
   entry_SYSCALL_64_after_hwframe+0x72/0xdc

  Freed by task 102551:
   kasan_save_stack+0x1e/0x40
   kasan_set_track+0x21/0x30
   kasan_save_free_info+0x2a/0x50
   __kasan_slab_free+0x106/0x190
   __kmem_cache_free+0x133/0x270
   svc_xprt_free+0x1e2/0x350 [sunrpc]
   svc_xprt_destroy_all+0x25a/0x440 [sunrpc]
   nfsd_put+0x125/0x240 [nfsd]
   nfsd_svc+0x2cb/0x3c0 [nfsd]
   write_threads+0x1ac/0x2a0 [nfsd]
   nfsctl_transaction_write+0xac/0x110 [nfsd]
   vfs_write+0x1c3/0xae0
   ksys_write+0xed/0x1c0
   do_syscall_64+0x38/0x90
   entry_SYSCALL_64_after_hwframe+0x72/0xdc

Fix the UAF by simply doing nothing in svc_tcp_listen_data_ready()
if state != TCP_LISTEN, that will avoid dereferencing svsk for all
child socket.</Note>
    </Notes>
    <CVE>CVE-2023-52885</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52885.html</URL>
        <Description>CVE-2023-52885</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227750</URL>
        <Description>SUSE Bug 1227750</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227753</URL>
        <Description>SUSE Bug 1227753</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="72">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix illegal rmb_desc access in SMC-D connection dump

A crash was found when dumping SMC-D connections. It can be reproduced
by following steps:

- run nginx/wrk test:
  smc_run nginx
  smc_run wrk -t 16 -c 1000 -d &lt;duration&gt; -H 'Connection: Close' &lt;URL&gt;

- continuously dump SMC-D connections in parallel:
  watch -n 1 'smcss -D'

 BUG: kernel NULL pointer dereference, address: 0000000000000030
 CPU: 2 PID: 7204 Comm: smcss Kdump: loaded Tainted: G	E      6.7.0+ #55
 RIP: 0010:__smc_diag_dump.constprop.0+0x5e5/0x620 [smc_diag]
 Call Trace:
  &lt;TASK&gt;
  ? __die+0x24/0x70
  ? page_fault_oops+0x66/0x150
  ? exc_page_fault+0x69/0x140
  ? asm_exc_page_fault+0x26/0x30
  ? __smc_diag_dump.constprop.0+0x5e5/0x620 [smc_diag]
  ? __kmalloc_node_track_caller+0x35d/0x430
  ? __alloc_skb+0x77/0x170
  smc_diag_dump_proto+0xd0/0xf0 [smc_diag]
  smc_diag_dump+0x26/0x60 [smc_diag]
  netlink_dump+0x19f/0x320
  __netlink_dump_start+0x1dc/0x300
  smc_diag_handler_dump+0x6a/0x80 [smc_diag]
  ? __pfx_smc_diag_dump+0x10/0x10 [smc_diag]
  sock_diag_rcv_msg+0x121/0x140
  ? __pfx_sock_diag_rcv_msg+0x10/0x10
  netlink_rcv_skb+0x5a/0x110
  sock_diag_rcv+0x28/0x40
  netlink_unicast+0x22a/0x330
  netlink_sendmsg+0x1f8/0x420
  __sock_sendmsg+0xb0/0xc0
  ____sys_sendmsg+0x24e/0x300
  ? copy_msghdr_from_user+0x62/0x80
  ___sys_sendmsg+0x7c/0xd0
  ? __do_fault+0x34/0x160
  ? do_read_fault+0x5f/0x100
  ? do_fault+0xb0/0x110
  ? __handle_mm_fault+0x2b0/0x6c0
  __sys_sendmsg+0x4d/0x80
  do_syscall_64+0x69/0x180
  entry_SYSCALL_64_after_hwframe+0x6e/0x76

It is possible that the connection is in process of being established
when we dump it. Assumed that the connection has been registered in a
link group by smc_conn_create() but the rmb_desc has not yet been
initialized by smc_buf_create(), thus causing the illegal access to
conn-&gt;rmb_desc. So fix it by checking before dump.</Note>
    </Notes>
    <CVE>CVE-2024-26615</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26615.html</URL>
        <Description>CVE-2024-26615</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1220942</URL>
        <Description>SUSE Bug 1220942</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="73">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

llc: Drop support for ETH_P_TR_802_2.

syzbot reported an uninit-value bug below. [0]

llc supports ETH_P_802_2 (0x0004) and used to support ETH_P_TR_802_2
(0x0011), and syzbot abused the latter to trigger the bug.

  write$tun(r0, &amp;(0x7f0000000040)={@val={0x0, 0x11}, @val, @mpls={[], @llc={@snap={0xaa, 0x1, ')', "90e5dd"}}}}, 0x16)

llc_conn_handler() initialises local variables {saddr,daddr}.mac
based on skb in llc_pdu_decode_sa()/llc_pdu_decode_da() and passes
them to __llc_lookup().

However, the initialisation is done only when skb-&gt;protocol is
htons(ETH_P_802_2), otherwise, __llc_lookup_established() and
__llc_lookup_listener() will read garbage.

The missing initialisation existed prior to commit 211ed865108e
("net: delete all instances of special processing for token ring").

It removed the part to kick out the token ring stuff but forgot to
close the door allowing ETH_P_TR_802_2 packets to sneak into llc_rcv().

Let's remove llc_tr_packet_type and complete the deprecation.

[0]:
BUG: KMSAN: uninit-value in __llc_lookup_established+0xe9d/0xf90
 __llc_lookup_established+0xe9d/0xf90
 __llc_lookup net/llc/llc_conn.c:611 [inline]
 llc_conn_handler+0x4bd/0x1360 net/llc/llc_conn.c:791
 llc_rcv+0xfbb/0x14a0 net/llc/llc_input.c:206
 __netif_receive_skb_one_core net/core/dev.c:5527 [inline]
 __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5641
 netif_receive_skb_internal net/core/dev.c:5727 [inline]
 netif_receive_skb+0x58/0x660 net/core/dev.c:5786
 tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1555
 tun_get_user+0x53af/0x66d0 drivers/net/tun.c:2002
 tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048
 call_write_iter include/linux/fs.h:2020 [inline]
 new_sync_write fs/read_write.c:491 [inline]
 vfs_write+0x8ef/0x1490 fs/read_write.c:584
 ksys_write+0x20f/0x4c0 fs/read_write.c:637
 __do_sys_write fs/read_write.c:649 [inline]
 __se_sys_write fs/read_write.c:646 [inline]
 __x64_sys_write+0x93/0xd0 fs/read_write.c:646
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x44/0x110 arch/x86/entry/common.c:82
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

Local variable daddr created at:
 llc_conn_handler+0x53/0x1360 net/llc/llc_conn.c:783
 llc_rcv+0xfbb/0x14a0 net/llc/llc_input.c:206

CPU: 1 PID: 5004 Comm: syz-executor994 Not tainted 6.6.0-syzkaller-14500-g1c41041124bd #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023</Note>
    </Notes>
    <CVE>CVE-2024-26635</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26635.html</URL>
        <Description>CVE-2024-26635</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221656</URL>
        <Description>SUSE Bug 1221656</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="74">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

llc: make llc_ui_sendmsg() more robust against bonding changes

syzbot was able to trick llc_ui_sendmsg(), allocating an skb with no
headroom, but subsequently trying to push 14 bytes of Ethernet header [1]

Like some others, llc_ui_sendmsg() releases the socket lock before
calling sock_alloc_send_skb().
Then it acquires it again, but does not redo all the sanity checks
that were performed.

This fix:

- Uses LL_RESERVED_SPACE() to reserve space.
- Check all conditions again after socket lock is held again.
- Do not account Ethernet header for mtu limitation.

[1]

skbuff: skb_under_panic: text:ffff800088baa334 len:1514 put:14 head:ffff0000c9c37000 data:ffff0000c9c36ff2 tail:0x5dc end:0x6c0 dev:bond0

 kernel BUG at net/core/skbuff.c:193 !
Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP
Modules linked in:
CPU: 0 PID: 6875 Comm: syz-executor.0 Not tainted 6.7.0-rc8-syzkaller-00101-g0802e17d9aca-dirty #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : skb_panic net/core/skbuff.c:189 [inline]
 pc : skb_under_panic+0x13c/0x140 net/core/skbuff.c:203
 lr : skb_panic net/core/skbuff.c:189 [inline]
 lr : skb_under_panic+0x13c/0x140 net/core/skbuff.c:203
sp : ffff800096f97000
x29: ffff800096f97010 x28: ffff80008cc8d668 x27: dfff800000000000
x26: ffff0000cb970c90 x25: 00000000000005dc x24: ffff0000c9c36ff2
x23: ffff0000c9c37000 x22: 00000000000005ea x21: 00000000000006c0
x20: 000000000000000e x19: ffff800088baa334 x18: 1fffe000368261ce
x17: ffff80008e4ed000 x16: ffff80008a8310f8 x15: 0000000000000001
x14: 1ffff00012df2d58 x13: 0000000000000000 x12: 0000000000000000
x11: 0000000000000001 x10: 0000000000ff0100 x9 : e28a51f1087e8400
x8 : e28a51f1087e8400 x7 : ffff80008028f8d0 x6 : 0000000000000000
x5 : 0000000000000001 x4 : 0000000000000001 x3 : ffff800082b78714
x2 : 0000000000000001 x1 : 0000000100000000 x0 : 0000000000000089
Call trace:
  skb_panic net/core/skbuff.c:189 [inline]
  skb_under_panic+0x13c/0x140 net/core/skbuff.c:203
  skb_push+0xf0/0x108 net/core/skbuff.c:2451
  eth_header+0x44/0x1f8 net/ethernet/eth.c:83
  dev_hard_header include/linux/netdevice.h:3188 [inline]
  llc_mac_hdr_init+0x110/0x17c net/llc/llc_output.c:33
  llc_sap_action_send_xid_c+0x170/0x344 net/llc/llc_s_ac.c:85
  llc_exec_sap_trans_actions net/llc/llc_sap.c:153 [inline]
  llc_sap_next_state net/llc/llc_sap.c:182 [inline]
  llc_sap_state_process+0x1ec/0x774 net/llc/llc_sap.c:209
  llc_build_and_send_xid_pkt+0x12c/0x1c0 net/llc/llc_sap.c:270
  llc_ui_sendmsg+0x7bc/0xb1c net/llc/af_llc.c:997
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg net/socket.c:745 [inline]
  sock_sendmsg+0x194/0x274 net/socket.c:767
  splice_to_socket+0x7cc/0xd58 fs/splice.c:881
  do_splice_from fs/splice.c:933 [inline]
  direct_splice_actor+0xe4/0x1c0 fs/splice.c:1142
  splice_direct_to_actor+0x2a0/0x7e4 fs/splice.c:1088
  do_splice_direct+0x20c/0x348 fs/splice.c:1194
  do_sendfile+0x4bc/0xc70 fs/read_write.c:1254
  __do_sys_sendfile64 fs/read_write.c:1322 [inline]
  __se_sys_sendfile64 fs/read_write.c:1308 [inline]
  __arm64_sys_sendfile64+0x160/0x3b4 fs/read_write.c:1308
  __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline]
  invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51
  el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136
  do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155
  el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678
  el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696
  el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:595
Code: aa1803e6 aa1903e7 a90023f5 94792f6a (d4210000)</Note>
    </Notes>
    <CVE>CVE-2024-26636</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26636.html</URL>
        <Description>CVE-2024-26636</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221659</URL>
        <Description>SUSE Bug 1221659</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="75">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

xhci: handle isoc Babble and Buffer Overrun events properly

xHCI 4.9 explicitly forbids assuming that the xHC has released its
ownership of a multi-TRB TD when it reports an error on one of the
early TRBs. Yet the driver makes such assumption and releases the TD,
allowing the remaining TRBs to be freed or overwritten by new TDs.

The xHC should also report completion of the final TRB due to its IOC
flag being set by us, regardless of prior errors. This event cannot
be recognized if the TD has already been freed earlier, resulting in
"Transfer event TRB DMA ptr not part of current TD" error message.

Fix this by reusing the logic for processing isoc Transaction Errors.
This also handles hosts which fail to report the final completion.

Fix transfer length reporting on Babble errors. They may be caused by
device malfunction, no guarantee that the buffer has been filled.</Note>
    </Notes>
    <CVE>CVE-2024-26659</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26659.html</URL>
        <Description>CVE-2024-26659</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222317</URL>
        <Description>SUSE Bug 1222317</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="76">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()

syzbot reported the following general protection fault [1]:

general protection fault, probably for non-canonical address 0xdffffc0000000010: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000080-0x0000000000000087]
...
RIP: 0010:tipc_udp_is_known_peer+0x9c/0x250 net/tipc/udp_media.c:291
...
Call Trace:
 &lt;TASK&gt;
 tipc_udp_nl_bearer_add+0x212/0x2f0 net/tipc/udp_media.c:646
 tipc_nl_bearer_add+0x21e/0x360 net/tipc/bearer.c:1089
 genl_family_rcv_msg_doit+0x1fc/0x2e0 net/netlink/genetlink.c:972
 genl_family_rcv_msg net/netlink/genetlink.c:1052 [inline]
 genl_rcv_msg+0x561/0x800 net/netlink/genetlink.c:1067
 netlink_rcv_skb+0x16b/0x440 net/netlink/af_netlink.c:2544
 genl_rcv+0x28/0x40 net/netlink/genetlink.c:1076
 netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]
 netlink_unicast+0x53b/0x810 net/netlink/af_netlink.c:1367
 netlink_sendmsg+0x8b7/0xd70 net/netlink/af_netlink.c:1909
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg+0xd5/0x180 net/socket.c:745
 ____sys_sendmsg+0x6ac/0x940 net/socket.c:2584
 ___sys_sendmsg+0x135/0x1d0 net/socket.c:2638
 __sys_sendmsg+0x117/0x1e0 net/socket.c:2667
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x40/0x110 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

The cause of this issue is that when tipc_nl_bearer_add() is called with
the TIPC_NLA_BEARER_UDP_OPTS attribute, tipc_udp_nl_bearer_add() is called
even if the bearer is not UDP.

tipc_udp_is_known_peer() called by tipc_udp_nl_bearer_add() assumes that
the media_ptr field of the tipc_bearer has an udp_bearer type object, so
the function goes crazy for non-UDP bearers.

This patch fixes the issue by checking the bearer type before calling
tipc_udp_nl_bearer_add() in tipc_nl_bearer_add().</Note>
    </Notes>
    <CVE>CVE-2024-26663</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26663.html</URL>
        <Description>CVE-2024-26663</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222326</URL>
        <Description>SUSE Bug 1222326</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="77">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ipv6: sr: fix possible use-after-free and null-ptr-deref

The pernet operations structure for the subsystem must be registered
before registering the generic netlink family.</Note>
    </Notes>
    <CVE>CVE-2024-26735</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26735.html</URL>
        <Description>CVE-2024-26735</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222372</URL>
        <Description>SUSE Bug 1222372</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="78">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

i40e: Do not allow untrusted VF to remove administratively set MAC

Currently when PF administratively sets VF's MAC address and the VF
is put down (VF tries to delete all MACs) then the MAC is removed
from MAC filters and primary VF MAC is zeroed.

Do not allow untrusted VF to remove primary MAC when it was set
administratively by PF.

Reproducer:
1) Create VF
2) Set VF interface up
3) Administratively set the VF's MAC
4) Put VF interface down

[root@host ~]# echo 1 &gt; /sys/class/net/enp2s0f0/device/sriov_numvfs
[root@host ~]# ip link set enp2s0f0v0 up
[root@host ~]# ip link set enp2s0f0 vf 0 mac fe:6c:b5:da:c7:7d
[root@host ~]# ip link show enp2s0f0
23: enp2s0f0: &lt;BROADCAST,MULTICAST,UP,LOWER_UP&gt; mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000
    link/ether 3c:ec:ef:b7:dd:04 brd ff:ff:ff:ff:ff:ff
    vf 0     link/ether fe:6c:b5:da:c7:7d brd ff:ff:ff:ff:ff:ff, spoof checking on, link-state auto, trust off
[root@host ~]# ip link set enp2s0f0v0 down
[root@host ~]# ip link show enp2s0f0
23: enp2s0f0: &lt;BROADCAST,MULTICAST,UP,LOWER_UP&gt; mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000
    link/ether 3c:ec:ef:b7:dd:04 brd ff:ff:ff:ff:ff:ff
    vf 0     link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff, spoof checking on, link-state auto, trust off</Note>
    </Notes>
    <CVE>CVE-2024-26830</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26830.html</URL>
        <Description>CVE-2024-26830</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223012</URL>
        <Description>SUSE Bug 1223012</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="79">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

hsr: Fix uninit-value access in hsr_get_node()

KMSAN reported the following uninit-value access issue [1]:

=====================================================
BUG: KMSAN: uninit-value in hsr_get_node+0xa2e/0xa40 net/hsr/hsr_framereg.c:246
 hsr_get_node+0xa2e/0xa40 net/hsr/hsr_framereg.c:246
 fill_frame_info net/hsr/hsr_forward.c:577 [inline]
 hsr_forward_skb+0xe12/0x30e0 net/hsr/hsr_forward.c:615
 hsr_dev_xmit+0x1a1/0x270 net/hsr/hsr_device.c:223
 __netdev_start_xmit include/linux/netdevice.h:4940 [inline]
 netdev_start_xmit include/linux/netdevice.h:4954 [inline]
 xmit_one net/core/dev.c:3548 [inline]
 dev_hard_start_xmit+0x247/0xa10 net/core/dev.c:3564
 __dev_queue_xmit+0x33b8/0x5130 net/core/dev.c:4349
 dev_queue_xmit include/linux/netdevice.h:3134 [inline]
 packet_xmit+0x9c/0x6b0 net/packet/af_packet.c:276
 packet_snd net/packet/af_packet.c:3087 [inline]
 packet_sendmsg+0x8b1d/0x9f30 net/packet/af_packet.c:3119
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg net/socket.c:745 [inline]
 __sys_sendto+0x735/0xa10 net/socket.c:2191
 __do_sys_sendto net/socket.c:2203 [inline]
 __se_sys_sendto net/socket.c:2199 [inline]
 __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

Uninit was created at:
 slab_post_alloc_hook+0x129/0xa70 mm/slab.h:768
 slab_alloc_node mm/slub.c:3478 [inline]
 kmem_cache_alloc_node+0x5e9/0xb10 mm/slub.c:3523
 kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:560
 __alloc_skb+0x318/0x740 net/core/skbuff.c:651
 alloc_skb include/linux/skbuff.h:1286 [inline]
 alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6334
 sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2787
 packet_alloc_skb net/packet/af_packet.c:2936 [inline]
 packet_snd net/packet/af_packet.c:3030 [inline]
 packet_sendmsg+0x70e8/0x9f30 net/packet/af_packet.c:3119
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg net/socket.c:745 [inline]
 __sys_sendto+0x735/0xa10 net/socket.c:2191
 __do_sys_sendto net/socket.c:2203 [inline]
 __se_sys_sendto net/socket.c:2199 [inline]
 __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

CPU: 1 PID: 5033 Comm: syz-executor334 Not tainted 6.7.0-syzkaller-00562-g9f8413c4a66f #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
=====================================================

If the packet type ID field in the Ethernet header is either ETH_P_PRP or
ETH_P_HSR, but it is not followed by an HSR tag, hsr_get_skb_sequence_nr()
reads an invalid value as a sequence number. This causes the above issue.

This patch fixes the issue by returning NULL if the Ethernet header is not
followed by an HSR tag.</Note>
    </Notes>
    <CVE>CVE-2024-26863</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26863.html</URL>
        <Description>CVE-2024-26863</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223021</URL>
        <Description>SUSE Bug 1223021</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="80">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

dm: call the resume method on internal suspend

There is this reported crash when experimenting with the lvm2 testsuite.
The list corruption is caused by the fact that the postsuspend and resume
methods were not paired correctly; there were two consecutive calls to the
origin_postsuspend function. The second call attempts to remove the
"hash_list" entry from a list, while it was already removed by the first
call.

Fix __dm_internal_resume so that it calls the preresume and resume
methods of the table's targets.

If a preresume method of some target fails, we are in a tricky situation.
We can't return an error because dm_internal_resume isn't supposed to
return errors. We can't return success, because then the "resume" and
"postsuspend" methods would not be paired correctly. So, we set the
DMF_SUSPENDED flag and we fake normal suspend - it may confuse userspace
tools, but it won't cause a kernel crash.

------------[ cut here ]------------
kernel BUG at lib/list_debug.c:56!
invalid opcode: 0000 [#1] PREEMPT SMP
CPU: 1 PID: 8343 Comm: dmsetup Not tainted 6.8.0-rc6 #4
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014
RIP: 0010:__list_del_entry_valid_or_report+0x77/0xc0
&lt;snip&gt;
RSP: 0018:ffff8881b831bcc0 EFLAGS: 00010282
RAX: 000000000000004e RBX: ffff888143b6eb80 RCX: 0000000000000000
RDX: 0000000000000001 RSI: ffffffff819053d0 RDI: 00000000ffffffff
RBP: ffff8881b83a3400 R08: 00000000fffeffff R09: 0000000000000058
R10: 0000000000000000 R11: ffffffff81a24080 R12: 0000000000000001
R13: ffff88814538e000 R14: ffff888143bc6dc0 R15: ffffffffa02e4bb0
FS:  00000000f7c0f780(0000) GS:ffff8893f0a40000(0000) knlGS:0000000000000000
CS:  0010 DS: 002b ES: 002b CR0: 0000000080050033
CR2: 0000000057fb5000 CR3: 0000000143474000 CR4: 00000000000006b0
Call Trace:
 &lt;TASK&gt;
 ? die+0x2d/0x80
 ? do_trap+0xeb/0xf0
 ? __list_del_entry_valid_or_report+0x77/0xc0
 ? do_error_trap+0x60/0x80
 ? __list_del_entry_valid_or_report+0x77/0xc0
 ? exc_invalid_op+0x49/0x60
 ? __list_del_entry_valid_or_report+0x77/0xc0
 ? asm_exc_invalid_op+0x16/0x20
 ? table_deps+0x1b0/0x1b0 [dm_mod]
 ? __list_del_entry_valid_or_report+0x77/0xc0
 origin_postsuspend+0x1a/0x50 [dm_snapshot]
 dm_table_postsuspend_targets+0x34/0x50 [dm_mod]
 dm_suspend+0xd8/0xf0 [dm_mod]
 dev_suspend+0x1f2/0x2f0 [dm_mod]
 ? table_deps+0x1b0/0x1b0 [dm_mod]
 ctl_ioctl+0x300/0x5f0 [dm_mod]
 dm_compat_ctl_ioctl+0x7/0x10 [dm_mod]
 __x64_compat_sys_ioctl+0x104/0x170
 do_syscall_64+0x184/0x1b0
 entry_SYSCALL_64_after_hwframe+0x46/0x4e
RIP: 0033:0xf7e6aead
&lt;snip&gt;
---[ end trace 0000000000000000 ]---</Note>
    </Notes>
    <CVE>CVE-2024-26880</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26880.html</URL>
        <Description>CVE-2024-26880</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223188</URL>
        <Description>SUSE Bug 1223188</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="81">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tracing/trigger: Fix to return error if failed to alloc snapshot

Fix register_snapshot_trigger() to return error code if it failed to
allocate a snapshot instead of 0 (success). Unless that, it will register
snapshot trigger without an error.</Note>
    </Notes>
    <CVE>CVE-2024-26920</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26920.html</URL>
        <Description>CVE-2024-26920</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228237</URL>
        <Description>SUSE Bug 1228237</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="82">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_set_pipapo: do not free live element

Pablo reports a crash with large batches of elements with a
back-to-back add/remove pattern.  Quoting Pablo:

  add_elem("00000000") timeout 100 ms
  ...
  add_elem("0000000X") timeout 100 ms
  del_elem("0000000X") &lt;---------------- delete one that was just added
  ...
  add_elem("00005000") timeout 100 ms

  1) nft_pipapo_remove() removes element 0000000X
  Then, KASAN shows a splat.

Looking at the remove function there is a chance that we will drop a
rule that maps to a non-deactivated element.

Removal happens in two steps, first we do a lookup for key k and return the
to-be-removed element and mark it as inactive in the next generation.
Then, in a second step, the element gets removed from the set/map.

The _remove function does not work correctly if we have more than one
element that share the same key.

This can happen if we insert an element into a set when the set already
holds an element with same key, but the element mapping to the existing
key has timed out or is not active in the next generation.

In such case its possible that removal will unmap the wrong element.
If this happens, we will leak the non-deactivated element, it becomes
unreachable.

The element that got deactivated (and will be freed later) will
remain reachable in the set data structure, this can result in
a crash when such an element is retrieved during lookup (stale
pointer).

Add a check that the fully matching key does in fact map to the element
that we have marked as inactive in the deactivation step.
If not, we need to continue searching.

Add a bug/warn trap at the end of the function as well, the remove
function must not ever be called with an invisible/unreachable/non-existent
element.

v2: avoid uneeded temporary variable (Stefano)</Note>
    </Notes>
    <CVE>CVE-2024-26924</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26924.html</URL>
        <Description>CVE-2024-26924</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223387</URL>
        <Description>SUSE Bug 1223387</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="83">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get()

nft_unregister_obj() can concurrent with __nft_obj_type_get(),
and there is not any protection when iterate over nf_tables_objects
list in __nft_obj_type_get(). Therefore, there is potential data-race
of nf_tables_objects list entry.

Use list_for_each_entry_rcu() to iterate over nf_tables_objects
list in __nft_obj_type_get(), and use rcu_read_lock() in the caller
nft_obj_type_get() to protect the entire type query process.</Note>
    </Notes>
    <CVE>CVE-2024-27019</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-27019.html</URL>
        <Description>CVE-2024-27019</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223813</URL>
        <Description>SUSE Bug 1223813</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="84">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()

nft_unregister_expr() can concurrent with __nft_expr_type_get(),
and there is not any protection when iterate over nf_tables_expressions
list in __nft_expr_type_get(). Therefore, there is potential data-race
of nf_tables_expressions list entry.

Use list_for_each_entry_rcu() to iterate over nf_tables_expressions
list in __nft_expr_type_get(), and use rcu_read_lock() in the caller
nft_expr_type_get() to protect the entire type query process.</Note>
    </Notes>
    <CVE>CVE-2024-27020</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-27020.html</URL>
        <Description>CVE-2024-27020</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223815</URL>
        <Description>SUSE Bug 1223815</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="85">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nbd: null check for nla_nest_start

nla_nest_start() may fail and return NULL. Insert a check and set errno
based on other call sites within the same source code.</Note>
    </Notes>
    <CVE>CVE-2024-27025</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-27025.html</URL>
        <Description>CVE-2024-27025</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223778</URL>
        <Description>SUSE Bug 1223778</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="86">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

vfio/pci: Disable auto-enable of exclusive INTx IRQ

Currently for devices requiring masking at the irqchip for INTx, ie.
devices without DisINTx support, the IRQ is enabled in request_irq()
and subsequently disabled as necessary to align with the masked status
flag.  This presents a window where the interrupt could fire between
these events, resulting in the IRQ incrementing the disable depth twice.
This would be unrecoverable for a user since the masked flag prevents
nested enables through vfio.

Instead, invert the logic using IRQF_NO_AUTOEN such that exclusive INTx
is never auto-enabled, then unmask as required.</Note>
    </Notes>
    <CVE>CVE-2024-27437</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-27437.html</URL>
        <Description>CVE-2024-27437</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222625</URL>
        <Description>SUSE Bug 1222625</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="87">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

dm snapshot: fix lockup in dm_exception_table_exit

There was reported lockup when we exit a snapshot with many exceptions.
Fix this by adding "cond_resched" to the loop that frees the exceptions.</Note>
    </Notes>
    <CVE>CVE-2024-35805</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35805.html</URL>
        <Description>CVE-2024-35805</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224743</URL>
        <Description>SUSE Bug 1224743</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="88">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

soc: fsl: qbman: Always disable interrupts when taking cgr_lock

smp_call_function_single disables IRQs when executing the callback. To
prevent deadlocks, we must disable IRQs when taking cgr_lock elsewhere.
This is already done by qman_update_cgr and qman_delete_cgr; fix the
other lockers.</Note>
    </Notes>
    <CVE>CVE-2024-35806</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35806.html</URL>
        <Description>CVE-2024-35806</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224699</URL>
        <Description>SUSE Bug 1224699</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="89">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

soc: fsl: qbman: Use raw spinlock for cgr_lock

smp_call_function always runs its callback in hard IRQ context, even on
PREEMPT_RT, where spinlocks can sleep. So we need to use a raw spinlock
for cgr_lock to ensure we aren't waiting on a sleeping task.

Although this bug has existed for a while, it was not apparent until
commit ef2a8d5478b9 ("net: dpaa: Adjust queue depth on rate change")
which invokes smp_call_function_single via qman_update_cgr_safe every
time a link goes up or down.</Note>
    </Notes>
    <CVE>CVE-2024-35819</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35819.html</URL>
        <Description>CVE-2024-35819</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224683</URL>
        <Description>SUSE Bug 1224683</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="90">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: libertas: fix some memleaks in lbs_allocate_cmd_buffer()

In the for statement of lbs_allocate_cmd_buffer(), if the allocation of
cmdarray[i].cmdbuf fails, both cmdarray and cmdarray[i].cmdbuf needs to
be freed. Otherwise, there will be memleaks in lbs_allocate_cmd_buffer().</Note>
    </Notes>
    <CVE>CVE-2024-35828</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35828.html</URL>
        <Description>CVE-2024-35828</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224622</URL>
        <Description>SUSE Bug 1224622</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="91">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: mvpp2: clear BM pool before initialization

Register value persist after booting the kernel using
kexec which results in kernel panic. Thus clear the
BM pool registers before initialisation to fix the issue.</Note>
    </Notes>
    <CVE>CVE-2024-35837</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35837.html</URL>
        <Description>CVE-2024-35837</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224500</URL>
        <Description>SUSE Bug 1224500</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="92">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ax25: fix use-after-free bugs caused by ax25_ds_del_timer

When the ax25 device is detaching, the ax25_dev_device_down()
calls ax25_ds_del_timer() to cleanup the slave_timer. When
the timer handler is running, the ax25_ds_del_timer() that
calls del_timer() in it will return directly. As a result,
the use-after-free bugs could happen, one of the scenarios
is shown below:

      (Thread 1)          |      (Thread 2)
                          | ax25_ds_timeout()
ax25_dev_device_down()    |
  ax25_ds_del_timer()     |
    del_timer()           |
  ax25_dev_put() //FREE   |
                          |  ax25_dev-&gt; //USE

In order to mitigate bugs, when the device is detaching, use
timer_shutdown_sync() to stop the timer.</Note>
    </Notes>
    <CVE>CVE-2024-35887</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35887.html</URL>
        <Description>CVE-2024-35887</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224663</URL>
        <Description>SUSE Bug 1224663</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="93">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/sched: act_skbmod: prevent kernel-infoleak

syzbot found that tcf_skbmod_dump() was copying four bytes
from kernel stack to user space [1].

The issue here is that 'struct tc_skbmod' has a four bytes hole.

We need to clear the structure before filling fields.

[1]
BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline]
 BUG: KMSAN: kernel-infoleak in copy_to_user_iter lib/iov_iter.c:24 [inline]
 BUG: KMSAN: kernel-infoleak in iterate_ubuf include/linux/iov_iter.h:29 [inline]
 BUG: KMSAN: kernel-infoleak in iterate_and_advance2 include/linux/iov_iter.h:245 [inline]
 BUG: KMSAN: kernel-infoleak in iterate_and_advance include/linux/iov_iter.h:271 [inline]
 BUG: KMSAN: kernel-infoleak in _copy_to_iter+0x366/0x2520 lib/iov_iter.c:185
  instrument_copy_to_user include/linux/instrumented.h:114 [inline]
  copy_to_user_iter lib/iov_iter.c:24 [inline]
  iterate_ubuf include/linux/iov_iter.h:29 [inline]
  iterate_and_advance2 include/linux/iov_iter.h:245 [inline]
  iterate_and_advance include/linux/iov_iter.h:271 [inline]
  _copy_to_iter+0x366/0x2520 lib/iov_iter.c:185
  copy_to_iter include/linux/uio.h:196 [inline]
  simple_copy_to_iter net/core/datagram.c:532 [inline]
  __skb_datagram_iter+0x185/0x1000 net/core/datagram.c:420
  skb_copy_datagram_iter+0x5c/0x200 net/core/datagram.c:546
  skb_copy_datagram_msg include/linux/skbuff.h:4050 [inline]
  netlink_recvmsg+0x432/0x1610 net/netlink/af_netlink.c:1962
  sock_recvmsg_nosec net/socket.c:1046 [inline]
  sock_recvmsg+0x2c4/0x340 net/socket.c:1068
  __sys_recvfrom+0x35a/0x5f0 net/socket.c:2242
  __do_sys_recvfrom net/socket.c:2260 [inline]
  __se_sys_recvfrom net/socket.c:2256 [inline]
  __x64_sys_recvfrom+0x126/0x1d0 net/socket.c:2256
 do_syscall_64+0xd5/0x1f0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

Uninit was stored to memory at:
  pskb_expand_head+0x30f/0x19d0 net/core/skbuff.c:2253
  netlink_trim+0x2c2/0x330 net/netlink/af_netlink.c:1317
  netlink_unicast+0x9f/0x1260 net/netlink/af_netlink.c:1351
  nlmsg_unicast include/net/netlink.h:1144 [inline]
  nlmsg_notify+0x21d/0x2f0 net/netlink/af_netlink.c:2610
  rtnetlink_send+0x73/0x90 net/core/rtnetlink.c:741
  rtnetlink_maybe_send include/linux/rtnetlink.h:17 [inline]
  tcf_add_notify net/sched/act_api.c:2048 [inline]
  tcf_action_add net/sched/act_api.c:2071 [inline]
  tc_ctl_action+0x146e/0x19d0 net/sched/act_api.c:2119
  rtnetlink_rcv_msg+0x1737/0x1900 net/core/rtnetlink.c:6595
  netlink_rcv_skb+0x375/0x650 net/netlink/af_netlink.c:2559
  rtnetlink_rcv+0x34/0x40 net/core/rtnetlink.c:6613
  netlink_unicast_kernel net/netlink/af_netlink.c:1335 [inline]
  netlink_unicast+0xf4c/0x1260 net/netlink/af_netlink.c:1361
  netlink_sendmsg+0x10df/0x11f0 net/netlink/af_netlink.c:1905
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x30f/0x380 net/socket.c:745
  ____sys_sendmsg+0x877/0xb60 net/socket.c:2584
  ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638
  __sys_sendmsg net/socket.c:2667 [inline]
  __do_sys_sendmsg net/socket.c:2676 [inline]
  __se_sys_sendmsg net/socket.c:2674 [inline]
  __x64_sys_sendmsg+0x307/0x4a0 net/socket.c:2674
 do_syscall_64+0xd5/0x1f0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

Uninit was stored to memory at:
  __nla_put lib/nlattr.c:1041 [inline]
  nla_put+0x1c6/0x230 lib/nlattr.c:1099
  tcf_skbmod_dump+0x23f/0xc20 net/sched/act_skbmod.c:256
  tcf_action_dump_old net/sched/act_api.c:1191 [inline]
  tcf_action_dump_1+0x85e/0x970 net/sched/act_api.c:1227
  tcf_action_dump+0x1fd/0x460 net/sched/act_api.c:1251
  tca_get_fill+0x519/0x7a0 net/sched/act_api.c:1628
  tcf_add_notify_msg net/sched/act_api.c:2023 [inline]
  tcf_add_notify net/sched/act_api.c:2042 [inline]
  tcf_action_add net/sched/act_api.c:2071 [inline]
  tc_ctl_action+0x1365/0x19d0 net/sched/act_api.c:2119
  rtnetlink_rcv_msg+0x1737/0x1900 net/core/rtnetlink.c:6595
  netlink_rcv_skb+0x375/0x650 net/netlink/af_netli
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-35893</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35893.html</URL>
        <Description>CVE-2024-35893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224512</URL>
        <Description>SUSE Bug 1224512</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="94">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list()

Many syzbot reports show extreme rtnl pressure, and many of them hint
that smc acquires rtnl in netns creation for no good reason [1]

This patch returns early from smc_pnet_net_init()
if there is no netdevice yet.

I am not even sure why smc_pnet_create_pnetids_list() even exists,
because smc_pnet_netdev_event() is also calling
smc_pnet_add_base_pnetid() when handling NETDEV_UP event.

[1] extract of typical syzbot reports

2 locks held by syz-executor.3/12252:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.4/12253:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.1/12257:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.2/12261:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.0/12265:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.3/12268:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.4/12271:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.1/12274:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.2/12280:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878</Note>
    </Notes>
    <CVE>CVE-2024-35934</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35934.html</URL>
        <Description>CVE-2024-35934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224641</URL>
        <Description>SUSE Bug 1224641</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="95">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

dyndbg: fix old BUG_ON in &gt;control parser

Fix a BUG_ON from 2009.  Even if it looks "unreachable" (I didn't
really look), lets make sure by removing it, doing pr_err and return
-EINVAL instead.</Note>
    </Notes>
    <CVE>CVE-2024-35947</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35947.html</URL>
        <Description>CVE-2024-35947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224647</URL>
        <Description>SUSE Bug 1224647</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="96">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

btrfs: make sure that WRITTEN is set on all metadata blocks

We previously would call btrfs_check_leaf() if we had the check
integrity code enabled, which meant that we could only run the extended
leaf checks if we had WRITTEN set on the header flags.

This leaves a gap in our checking, because we could end up with
corruption on disk where WRITTEN isn't set on the leaf, and then the
extended leaf checks don't get run which we rely on to validate all of
the item pointers to make sure we don't access memory outside of the
extent buffer.

However, since 732fab95abe2 ("btrfs: check-integrity: remove
CONFIG_BTRFS_FS_CHECK_INTEGRITY option") we no longer call
btrfs_check_leaf() from btrfs_mark_buffer_dirty(), which means we only
ever call it on blocks that are being written out, and thus have WRITTEN
set, or that are being read in, which should have WRITTEN set.

Add checks to make sure we have WRITTEN set appropriately, and then make
sure __btrfs_check_leaf() always does the item checking.  This will
protect us from file systems that have been corrupted and no longer have
WRITTEN set on some of the blocks.

This was hit on a crafted image tweaking the WRITTEN bit and reported by
KASAN as out-of-bound access in the eb accessors. The example is a dir
item at the end of an eb.

  [2.042] BTRFS warning (device loop1): bad eb member start: ptr 0x3fff start 30572544 member offset 16410 size 2
  [2.040] general protection fault, probably for non-canonical address 0xe0009d1000000003: 0000 [#1] PREEMPT SMP KASAN NOPTI
  [2.537] KASAN: maybe wild-memory-access in range [0x0005088000000018-0x000508800000001f]
  [2.729] CPU: 0 PID: 2587 Comm: mount Not tainted 6.8.2 #1
  [2.729] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
  [2.621] RIP: 0010:btrfs_get_16+0x34b/0x6d0
  [2.621] RSP: 0018:ffff88810871fab8 EFLAGS: 00000206
  [2.621] RAX: 0000a11000000003 RBX: ffff888104ff8720 RCX: ffff88811b2288c0
  [2.621] RDX: dffffc0000000000 RSI: ffffffff81dd8aca RDI: ffff88810871f748
  [2.621] RBP: 000000000000401a R08: 0000000000000001 R09: ffffed10210e3ee9
  [2.621] R10: ffff88810871f74f R11: 205d323430333737 R12: 000000000000001a
  [2.621] R13: 000508800000001a R14: 1ffff110210e3f5d R15: ffffffff850011e8
  [2.621] FS:  00007f56ea275840(0000) GS:ffff88811b200000(0000) knlGS:0000000000000000
  [2.621] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  [2.621] CR2: 00007febd13b75c0 CR3: 000000010bb50000 CR4: 00000000000006f0
  [2.621] Call Trace:
  [2.621]  &lt;TASK&gt;
  [2.621]  ? show_regs+0x74/0x80
  [2.621]  ? die_addr+0x46/0xc0
  [2.621]  ? exc_general_protection+0x161/0x2a0
  [2.621]  ? asm_exc_general_protection+0x26/0x30
  [2.621]  ? btrfs_get_16+0x33a/0x6d0
  [2.621]  ? btrfs_get_16+0x34b/0x6d0
  [2.621]  ? btrfs_get_16+0x33a/0x6d0
  [2.621]  ? __pfx_btrfs_get_16+0x10/0x10
  [2.621]  ? __pfx_mutex_unlock+0x10/0x10
  [2.621]  btrfs_match_dir_item_name+0x101/0x1a0
  [2.621]  btrfs_lookup_dir_item+0x1f3/0x280
  [2.621]  ? __pfx_btrfs_lookup_dir_item+0x10/0x10
  [2.621]  btrfs_get_tree+0xd25/0x1910

[ copy more details from report ]</Note>
    </Notes>
    <CVE>CVE-2024-35949</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35949.html</URL>
        <Description>CVE-2024-35949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224700</URL>
        <Description>SUSE Bug 1224700</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1229273</URL>
        <Description>SUSE Bug 1229273</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="97">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: RFCOMM: Fix not validating setsockopt user input

syzbot reported rfcomm_sock_setsockopt_old() is copying data without
checking user input length.

BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset
include/linux/sockptr.h:49 [inline]
BUG: KASAN: slab-out-of-bounds in copy_from_sockptr
include/linux/sockptr.h:55 [inline]
BUG: KASAN: slab-out-of-bounds in rfcomm_sock_setsockopt_old
net/bluetooth/rfcomm/sock.c:632 [inline]
BUG: KASAN: slab-out-of-bounds in rfcomm_sock_setsockopt+0x893/0xa70
net/bluetooth/rfcomm/sock.c:673
Read of size 4 at addr ffff8880209a8bc3 by task syz-executor632/5064</Note>
    </Notes>
    <CVE>CVE-2024-35966</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35966.html</URL>
        <Description>CVE-2024-35966</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224576</URL>
        <Description>SUSE Bug 1224576</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="98">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: SCO: Fix not validating setsockopt user input

syzbot reported sco_sock_setsockopt() is copying data without
checking user input length.

BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset
include/linux/sockptr.h:49 [inline]
BUG: KASAN: slab-out-of-bounds in copy_from_sockptr
include/linux/sockptr.h:55 [inline]
BUG: KASAN: slab-out-of-bounds in sco_sock_setsockopt+0xc0b/0xf90
net/bluetooth/sco.c:893
Read of size 4 at addr ffff88805f7b15a3 by task syz-executor.5/12578</Note>
    </Notes>
    <CVE>CVE-2024-35967</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35967.html</URL>
        <Description>CVE-2024-35967</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224587</URL>
        <Description>SUSE Bug 1224587</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="99">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Fix memory leak in hci_req_sync_complete()

In 'hci_req_sync_complete()', always free the previous sync
request state before assigning reference to a new one.</Note>
    </Notes>
    <CVE>CVE-2024-35978</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35978.html</URL>
        <Description>CVE-2024-35978</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224571</URL>
        <Description>SUSE Bug 1224571</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="100">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ACPI: CPPC: Use access_width over bit_width for system memory accesses

To align with ACPI 6.3+, since bit_width can be any 8-bit value, it
cannot be depended on to be always on a clean 8b boundary. This was
uncovered on the Cobalt 100 platform.

SError Interrupt on CPU26, code 0xbe000011 -- SError
 CPU: 26 PID: 1510 Comm: systemd-udevd Not tainted 5.15.2.1-13 #1
 Hardware name: MICROSOFT CORPORATION, BIOS MICROSOFT CORPORATION
 pstate: 62400009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
 pc : cppc_get_perf_caps+0xec/0x410
 lr : cppc_get_perf_caps+0xe8/0x410
 sp : ffff8000155ab730
 x29: ffff8000155ab730 x28: ffff0080139d0038 x27: ffff0080139d0078
 x26: 0000000000000000 x25: ffff0080139d0058 x24: 00000000ffffffff
 x23: ffff0080139d0298 x22: ffff0080139d0278 x21: 0000000000000000
 x20: ffff00802b251910 x19: ffff0080139d0000 x18: ffffffffffffffff
 x17: 0000000000000000 x16: ffffdc7e111bad04 x15: ffff00802b251008
 x14: ffffffffffffffff x13: ffff013f1fd63300 x12: 0000000000000006
 x11: ffffdc7e128f4420 x10: 0000000000000000 x9 : ffffdc7e111badec
 x8 : ffff00802b251980 x7 : 0000000000000000 x6 : ffff0080139d0028
 x5 : 0000000000000000 x4 : ffff0080139d0018 x3 : 00000000ffffffff
 x2 : 0000000000000008 x1 : ffff8000155ab7a0 x0 : 0000000000000000
 Kernel panic - not syncing: Asynchronous SError Interrupt
 CPU: 26 PID: 1510 Comm: systemd-udevd Not tainted
5.15.2.1-13 #1
 Hardware name: MICROSOFT CORPORATION, BIOS MICROSOFT CORPORATION
 Call trace:
  dump_backtrace+0x0/0x1e0
  show_stack+0x24/0x30
  dump_stack_lvl+0x8c/0xb8
  dump_stack+0x18/0x34
  panic+0x16c/0x384
  add_taint+0x0/0xc0
  arm64_serror_panic+0x7c/0x90
  arm64_is_fatal_ras_serror+0x34/0xa4
  do_serror+0x50/0x6c
  el1h_64_error_handler+0x40/0x74
  el1h_64_error+0x7c/0x80
  cppc_get_perf_caps+0xec/0x410
  cppc_cpufreq_cpu_init+0x74/0x400 [cppc_cpufreq]
  cpufreq_online+0x2dc/0xa30
  cpufreq_add_dev+0xc0/0xd4
  subsys_interface_register+0x134/0x14c
  cpufreq_register_driver+0x1b0/0x354
  cppc_cpufreq_init+0x1a8/0x1000 [cppc_cpufreq]
  do_one_initcall+0x50/0x250
  do_init_module+0x60/0x27c
  load_module+0x2300/0x2570
  __do_sys_finit_module+0xa8/0x114
  __arm64_sys_finit_module+0x2c/0x3c
  invoke_syscall+0x78/0x100
  el0_svc_common.constprop.0+0x180/0x1a0
  do_el0_svc+0x84/0xa0
  el0_svc+0x2c/0xc0
  el0t_64_sync_handler+0xa4/0x12c
  el0t_64_sync+0x1a4/0x1a8

Instead, use access_width to determine the size and use the offset and
width to shift and mask the bits to read/write out. Make sure to add a
check for system memory since pcc redefines the access_width to
subspace id.

If access_width is not set, then fall back to using bit_width.

[ rjw: Subject and changelog edits, comment adjustments ]</Note>
    </Notes>
    <CVE>CVE-2024-35995</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35995.html</URL>
        <Description>CVE-2024-35995</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224557</URL>
        <Description>SUSE Bug 1224557</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="101">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

i40e: Do not use WQ_MEM_RECLAIM flag for workqueue

Issue reported by customer during SRIOV testing, call trace:
When both i40e and the i40iw driver are loaded, a warning
in check_flush_dependency is being triggered. This seems
to be because of the i40e driver workqueue is allocated with
the WQ_MEM_RECLAIM flag, and the i40iw one is not.

Similar error was encountered on ice too and it was fixed by
removing the flag. Do the same for i40e too.

[Feb 9 09:08] ------------[ cut here ]------------
[  +0.000004] workqueue: WQ_MEM_RECLAIM i40e:i40e_service_task [i40e] is
flushing !WQ_MEM_RECLAIM infiniband:0x0
[  +0.000060] WARNING: CPU: 0 PID: 937 at kernel/workqueue.c:2966
check_flush_dependency+0x10b/0x120
[  +0.000007] Modules linked in: snd_seq_dummy snd_hrtimer snd_seq
snd_timer snd_seq_device snd soundcore nls_utf8 cifs cifs_arc4
nls_ucs2_utils rdma_cm iw_cm ib_cm cifs_md4 dns_resolver netfs qrtr
rfkill sunrpc vfat fat intel_rapl_msr intel_rapl_common irdma
intel_uncore_frequency intel_uncore_frequency_common ice ipmi_ssif
isst_if_common skx_edac nfit libnvdimm x86_pkg_temp_thermal
intel_powerclamp gnss coretemp ib_uverbs rapl intel_cstate ib_core
iTCO_wdt iTCO_vendor_support acpi_ipmi mei_me ipmi_si intel_uncore
ioatdma i2c_i801 joydev pcspkr mei ipmi_devintf lpc_ich
intel_pch_thermal i2c_smbus ipmi_msghandler acpi_power_meter acpi_pad
xfs libcrc32c ast sd_mod drm_shmem_helper t10_pi drm_kms_helper sg ixgbe
drm i40e ahci crct10dif_pclmul libahci crc32_pclmul igb crc32c_intel
libata ghash_clmulni_intel i2c_algo_bit mdio dca wmi dm_mirror
dm_region_hash dm_log dm_mod fuse
[  +0.000050] CPU: 0 PID: 937 Comm: kworker/0:3 Kdump: loaded Not
tainted 6.8.0-rc2-Feb-net_dev-Qiueue-00279-gbd43c5687e05 #1
[  +0.000003] Hardware name: Intel Corporation S2600BPB/S2600BPB, BIOS
SE5C620.86B.02.01.0013.121520200651 12/15/2020
[  +0.000001] Workqueue: i40e i40e_service_task [i40e]
[  +0.000024] RIP: 0010:check_flush_dependency+0x10b/0x120
[  +0.000003] Code: ff 49 8b 54 24 18 48 8d 8b b0 00 00 00 49 89 e8 48
81 c6 b0 00 00 00 48 c7 c7 b0 97 fa 9f c6 05 8a cc 1f 02 01 e8 35 b3 fd
ff &lt;0f&gt; 0b e9 10 ff ff ff 80 3d 78 cc 1f 02 00 75 94 e9 46 ff ff ff 90
[  +0.000002] RSP: 0018:ffffbd294976bcf8 EFLAGS: 00010282
[  +0.000002] RAX: 0000000000000000 RBX: ffff94d4c483c000 RCX:
0000000000000027
[  +0.000001] RDX: ffff94d47f620bc8 RSI: 0000000000000001 RDI:
ffff94d47f620bc0
[  +0.000001] RBP: 0000000000000000 R08: 0000000000000000 R09:
00000000ffff7fff
[  +0.000001] R10: ffffbd294976bb98 R11: ffffffffa0be65e8 R12:
ffff94c5451ea180
[  +0.000001] R13: ffff94c5ab5e8000 R14: ffff94c5c20b6e05 R15:
ffff94c5f1330ab0
[  +0.000001] FS:  0000000000000000(0000) GS:ffff94d47f600000(0000)
knlGS:0000000000000000
[  +0.000002] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  +0.000001] CR2: 00007f9e6f1fca70 CR3: 0000000038e20004 CR4:
00000000007706f0
[  +0.000000] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
0000000000000000
[  +0.000001] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:
0000000000000400
[  +0.000001] PKRU: 55555554
[  +0.000001] Call Trace:
[  +0.000001]  &lt;TASK&gt;
[  +0.000002]  ? __warn+0x80/0x130
[  +0.000003]  ? check_flush_dependency+0x10b/0x120
[  +0.000002]  ? report_bug+0x195/0x1a0
[  +0.000005]  ? handle_bug+0x3c/0x70
[  +0.000003]  ? exc_invalid_op+0x14/0x70
[  +0.000002]  ? asm_exc_invalid_op+0x16/0x20
[  +0.000006]  ? check_flush_dependency+0x10b/0x120
[  +0.000002]  ? check_flush_dependency+0x10b/0x120
[  +0.000002]  __flush_workqueue+0x126/0x3f0
[  +0.000015]  ib_cache_cleanup_one+0x1c/0xe0 [ib_core]
[  +0.000056]  __ib_unregister_device+0x6a/0xb0 [ib_core]
[  +0.000023]  ib_unregister_device_and_put+0x34/0x50 [ib_core]
[  +0.000020]  i40iw_close+0x4b/0x90 [irdma]
[  +0.000022]  i40e_notify_client_of_netdev_close+0x54/0xc0 [i40e]
[  +0.000035]  i40e_service_task+0x126/0x190 [i40e]
[  +0.000024]  process_one_work+0x174/0x340
[  +0.000003]  worker_th
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-36004</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36004.html</URL>
        <Description>CVE-2024-36004</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224545</URL>
        <Description>SUSE Bug 1224545</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="102">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/arm/malidp: fix a possible null pointer dereference

In malidp_mw_connector_reset, new memory is allocated with kzalloc, but
no check is performed. In order to prevent null pointer dereferencing,
ensure that mw_state is checked before calling
__drm_atomic_helper_connector_reset.</Note>
    </Notes>
    <CVE>CVE-2024-36014</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36014.html</URL>
        <Description>CVE-2024-36014</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225593</URL>
        <Description>SUSE Bug 1225593</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="103">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: Fix loop termination condition in gss_free_in_token_pages()

The in_token-&gt;pages[] array is not NULL terminated. This results in
the following KASAN splat:

  KASAN: maybe wild-memory-access in range [0x04a2013400000008-0x04a201340000000f]</Note>
    </Notes>
    <CVE>CVE-2024-36288</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36288.html</URL>
        <Description>CVE-2024-36288</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226834</URL>
        <Description>SUSE Bug 1226834</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="104">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2024-36592</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36592.html</URL>
        <Description>CVE-2024-36592</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="105">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ipv6: prevent NULL dereference in ip6_output()

According to syzbot, there is a chance that ip6_dst_idev()
returns NULL in ip6_output(). Most places in IPv6 stack
deal with a NULL idev just fine, but not here.

syzbot reported:

general protection fault, probably for non-canonical address 0xdffffc00000000bc: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x00000000000005e0-0x00000000000005e7]
CPU: 0 PID: 9775 Comm: syz-executor.4 Not tainted 6.9.0-rc5-syzkaller-00157-g6a30653b604a #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
 RIP: 0010:ip6_output+0x231/0x3f0 net/ipv6/ip6_output.c:237
Code: 3c 1e 00 49 89 df 74 08 4c 89 ef e8 19 58 db f7 48 8b 44 24 20 49 89 45 00 49 89 c5 48 8d 9d e0 05 00 00 48 89 d8 48 c1 e8 03 &lt;42&gt; 0f b6 04 38 84 c0 4c 8b 74 24 28 0f 85 61 01 00 00 8b 1b 31 ff
RSP: 0018:ffffc9000927f0d8 EFLAGS: 00010202
RAX: 00000000000000bc RBX: 00000000000005e0 RCX: 0000000000040000
RDX: ffffc900131f9000 RSI: 0000000000004f47 RDI: 0000000000004f48
RBP: 0000000000000000 R08: ffffffff8a1f0b9a R09: 1ffffffff1f51fad
R10: dffffc0000000000 R11: fffffbfff1f51fae R12: ffff8880293ec8c0
R13: ffff88805d7fc000 R14: 1ffff1100527d91a R15: dffffc0000000000
FS:  00007f135c6856c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000080 CR3: 0000000064096000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  NF_HOOK include/linux/netfilter.h:314 [inline]
  ip6_xmit+0xefe/0x17f0 net/ipv6/ip6_output.c:358
  sctp_v6_xmit+0x9f2/0x13f0 net/sctp/ipv6.c:248
  sctp_packet_transmit+0x26ad/0x2ca0 net/sctp/output.c:653
  sctp_packet_singleton+0x22c/0x320 net/sctp/outqueue.c:783
  sctp_outq_flush_ctrl net/sctp/outqueue.c:914 [inline]
  sctp_outq_flush+0x6d5/0x3e20 net/sctp/outqueue.c:1212
  sctp_side_effects net/sctp/sm_sideeffect.c:1198 [inline]
  sctp_do_sm+0x59cc/0x60c0 net/sctp/sm_sideeffect.c:1169
  sctp_primitive_ASSOCIATE+0x95/0xc0 net/sctp/primitive.c:73
  __sctp_connect+0x9cd/0xe30 net/sctp/socket.c:1234
  sctp_connect net/sctp/socket.c:4819 [inline]
  sctp_inet_connect+0x149/0x1f0 net/sctp/socket.c:4834
  __sys_connect_file net/socket.c:2048 [inline]
  __sys_connect+0x2df/0x310 net/socket.c:2065
  __do_sys_connect net/socket.c:2075 [inline]
  __se_sys_connect net/socket.c:2072 [inline]
  __x64_sys_connect+0x7a/0x90 net/socket.c:2072
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f</Note>
    </Notes>
    <CVE>CVE-2024-36901</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36901.html</URL>
        <Description>CVE-2024-36901</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225711</URL>
        <Description>SUSE Bug 1225711</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="106">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()

syzbot is able to trigger the following crash [1],
caused by unsafe ip6_dst_idev() use.

Indeed ip6_dst_idev() can return NULL, and must always be checked.

[1]

Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
CPU: 0 PID: 31648 Comm: syz-executor.0 Not tainted 6.9.0-rc4-next-20240417-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
 RIP: 0010:__fib6_rule_action net/ipv6/fib6_rules.c:237 [inline]
 RIP: 0010:fib6_rule_action+0x241/0x7b0 net/ipv6/fib6_rules.c:267
Code: 02 00 00 49 8d 9f d8 00 00 00 48 89 d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 f9 32 bf f7 48 8b 1b 48 89 d8 48 c1 e8 03 &lt;42&gt; 80 3c 20 00 74 08 48 89 df e8 e0 32 bf f7 4c 8b 03 48 89 ef 4c
RSP: 0018:ffffc9000fc1f2f0 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 1a772f98c8186700
RDX: 0000000000000003 RSI: ffffffff8bcac4e0 RDI: ffffffff8c1f9760
RBP: ffff8880673fb980 R08: ffffffff8fac15ef R09: 1ffffffff1f582bd
R10: dffffc0000000000 R11: fffffbfff1f582be R12: dffffc0000000000
R13: 0000000000000080 R14: ffff888076509000 R15: ffff88807a029a00
FS:  00007f55e82ca6c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b31d23000 CR3: 0000000022b66000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  fib_rules_lookup+0x62c/0xdb0 net/core/fib_rules.c:317
  fib6_rule_lookup+0x1fd/0x790 net/ipv6/fib6_rules.c:108
  ip6_route_output_flags_noref net/ipv6/route.c:2637 [inline]
  ip6_route_output_flags+0x38e/0x610 net/ipv6/route.c:2649
  ip6_route_output include/net/ip6_route.h:93 [inline]
  ip6_dst_lookup_tail+0x189/0x11a0 net/ipv6/ip6_output.c:1120
  ip6_dst_lookup_flow+0xb9/0x180 net/ipv6/ip6_output.c:1250
  sctp_v6_get_dst+0x792/0x1e20 net/sctp/ipv6.c:326
  sctp_transport_route+0x12c/0x2e0 net/sctp/transport.c:455
  sctp_assoc_add_peer+0x614/0x15c0 net/sctp/associola.c:662
  sctp_connect_new_asoc+0x31d/0x6c0 net/sctp/socket.c:1099
  __sctp_connect+0x66d/0xe30 net/sctp/socket.c:1197
  sctp_connect net/sctp/socket.c:4819 [inline]
  sctp_inet_connect+0x149/0x1f0 net/sctp/socket.c:4834
  __sys_connect_file net/socket.c:2048 [inline]
  __sys_connect+0x2df/0x310 net/socket.c:2065
  __do_sys_connect net/socket.c:2075 [inline]
  __se_sys_connect net/socket.c:2072 [inline]
  __x64_sys_connect+0x7a/0x90 net/socket.c:2072
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f</Note>
    </Notes>
    <CVE>CVE-2024-36902</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36902.html</URL>
        <Description>CVE-2024-36902</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225719</URL>
        <Description>SUSE Bug 1225719</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="107">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload

The session resources are used by FW and driver when session is offloaded,
once session is uploaded these resources are not used. The lock is not
required as these fields won't be used any longer. The offload and upload
calls are sequential, hence lock is not required.

This will suppress following BUG_ON():

[  449.843143] ------------[ cut here ]------------
[  449.848302] kernel BUG at mm/vmalloc.c:2727!
[  449.853072] invalid opcode: 0000 [#1] PREEMPT SMP PTI
[  449.858712] CPU: 5 PID: 1996 Comm: kworker/u24:2 Not tainted 5.14.0-118.el9.x86_64 #1
Rebooting.
[  449.867454] Hardware name: Dell Inc. PowerEdge R730/0WCJNT, BIOS 2.3.4 11/08/2016
[  449.876966] Workqueue: fc_rport_eq fc_rport_work [libfc]
[  449.882910] RIP: 0010:vunmap+0x2e/0x30
[  449.887098] Code: 00 65 8b 05 14 a2 f0 4a a9 00 ff ff 00 75 1b 55 48 89 fd e8 34 36 79 00 48 85 ed 74 0b 48 89 ef 31 f6 5d e9 14 fc ff ff 5d c3 &lt;0f&gt; 0b 0f 1f 44 00 00 41 57 41 56 49 89 ce 41 55 49 89 fd 41 54 41
[  449.908054] RSP: 0018:ffffb83d878b3d68 EFLAGS: 00010206
[  449.913887] RAX: 0000000080000201 RBX: ffff8f4355133550 RCX: 000000000d400005
[  449.921843] RDX: 0000000000000001 RSI: 0000000000001000 RDI: ffffb83da53f5000
[  449.929808] RBP: ffff8f4ac6675800 R08: ffffb83d878b3d30 R09: 00000000000efbdf
[  449.937774] R10: 0000000000000003 R11: ffff8f434573e000 R12: 0000000000001000
[  449.945736] R13: 0000000000001000 R14: ffffb83da53f5000 R15: ffff8f43d4ea3ae0
[  449.953701] FS:  0000000000000000(0000) GS:ffff8f529fc80000(0000) knlGS:0000000000000000
[  449.962732] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  449.969138] CR2: 00007f8cf993e150 CR3: 0000000efbe10003 CR4: 00000000003706e0
[  449.977102] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  449.985065] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  449.993028] Call Trace:
[  449.995756]  __iommu_dma_free+0x96/0x100
[  450.000139]  bnx2fc_free_session_resc+0x67/0x240 [bnx2fc]
[  450.006171]  bnx2fc_upload_session+0xce/0x100 [bnx2fc]
[  450.011910]  bnx2fc_rport_event_handler+0x9f/0x240 [bnx2fc]
[  450.018136]  fc_rport_work+0x103/0x5b0 [libfc]
[  450.023103]  process_one_work+0x1e8/0x3c0
[  450.027581]  worker_thread+0x50/0x3b0
[  450.031669]  ? rescuer_thread+0x370/0x370
[  450.036143]  kthread+0x149/0x170
[  450.039744]  ? set_kthread_struct+0x40/0x40
[  450.044411]  ret_from_fork+0x22/0x30
[  450.048404] Modules linked in: vfat msdos fat xfs nfs_layout_nfsv41_files rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver dm_service_time qedf qed crc8 bnx2fc libfcoe libfc scsi_transport_fc intel_rapl_msr intel_rapl_common x86_pkg_temp_thermal intel_powerclamp dcdbas rapl intel_cstate intel_uncore mei_me pcspkr mei ipmi_ssif lpc_ich ipmi_si fuse zram ext4 mbcache jbd2 loop nfsv3 nfs_acl nfs lockd grace fscache netfs irdma ice sd_mod t10_pi sg ib_uverbs ib_core 8021q garp mrp stp llc mgag200 i2c_algo_bit drm_kms_helper syscopyarea sysfillrect sysimgblt mxm_wmi fb_sys_fops cec crct10dif_pclmul ahci crc32_pclmul bnx2x drm ghash_clmulni_intel libahci rfkill i40e libata megaraid_sas mdio wmi sunrpc lrw dm_crypt dm_round_robin dm_multipath dm_snapshot dm_bufio dm_mirror dm_region_hash dm_log dm_zero dm_mod linear raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx raid6_pq libcrc32c crc32c_intel raid1 raid0 iscsi_ibft squashfs be2iscsi bnx2i cnic uio cxgb4i cxgb4 tls
[  450.048497]  libcxgbi libcxgb qla4xxx iscsi_boot_sysfs iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi edd ipmi_devintf ipmi_msghandler
[  450.159753] ---[ end trace 712de2c57c64abc8 ]---</Note>
    </Notes>
    <CVE>CVE-2024-36919</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36919.html</URL>
        <Description>CVE-2024-36919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225767</URL>
        <Description>SUSE Bug 1225767</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="108">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up()

lpfc_worker_wake_up() calls the lpfc_work_done() routine, which takes the
hbalock.  Thus, lpfc_worker_wake_up() should not be called while holding the
hbalock to avoid potential deadlock.</Note>
    </Notes>
    <CVE>CVE-2024-36924</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36924.html</URL>
        <Description>CVE-2024-36924</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225820</URL>
        <Description>SUSE Bug 1225820</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="109">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nfs: Handle error of rpc_proc_register() in nfs_net_init().

syzkaller reported a warning [0] triggered while destroying immature
netns.

rpc_proc_register() was called in init_nfs_fs(), but its error
has been ignored since at least the initial commit 1da177e4c3f4
("Linux-2.6.12-rc2").

Recently, commit d47151b79e32 ("nfs: expose /proc/net/sunrpc/nfs
in net namespaces") converted the procfs to per-netns and made
the problem more visible.

Even when rpc_proc_register() fails, nfs_net_init() could succeed,
and thus nfs_net_exit() will be called while destroying the netns.

Then, remove_proc_entry() will be called for non-existing proc
directory and trigger the warning below.

Let's handle the error of rpc_proc_register() properly in nfs_net_init().

[0]:
name 'nfs'
WARNING: CPU: 1 PID: 1710 at fs/proc/generic.c:711 remove_proc_entry+0x1bb/0x2d0 fs/proc/generic.c:711
Modules linked in:
CPU: 1 PID: 1710 Comm: syz-executor.2 Not tainted 6.8.0-12822-gcd51db110a7e #12
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
RIP: 0010:remove_proc_entry+0x1bb/0x2d0 fs/proc/generic.c:711
Code: 41 5d 41 5e c3 e8 85 09 b5 ff 48 c7 c7 88 58 64 86 e8 09 0e 71 02 e8 74 09 b5 ff 4c 89 e6 48 c7 c7 de 1b 80 84 e8 c5 ad 97 ff &lt;0f&gt; 0b eb b1 e8 5c 09 b5 ff 48 c7 c7 88 58 64 86 e8 e0 0d 71 02 eb
RSP: 0018:ffffc9000c6d7ce0 EFLAGS: 00010286
RAX: 0000000000000000 RBX: ffff8880422b8b00 RCX: ffffffff8110503c
RDX: ffff888030652f00 RSI: ffffffff81105045 RDI: 0000000000000001
RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000001 R11: ffffffff81bb62cb R12: ffffffff84807ffc
R13: ffff88804ad6fcc0 R14: ffffffff84807ffc R15: ffffffff85741ff8
FS:  00007f30cfba8640(0000) GS:ffff88807dd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ff51afe8000 CR3: 000000005a60a005 CR4: 0000000000770ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 rpc_proc_unregister+0x64/0x70 net/sunrpc/stats.c:310
 nfs_net_exit+0x1c/0x30 fs/nfs/inode.c:2438
 ops_exit_list+0x62/0xb0 net/core/net_namespace.c:170
 setup_net+0x46c/0x660 net/core/net_namespace.c:372
 copy_net_ns+0x244/0x590 net/core/net_namespace.c:505
 create_new_namespaces+0x2ed/0x770 kernel/nsproxy.c:110
 unshare_nsproxy_namespaces+0xae/0x160 kernel/nsproxy.c:228
 ksys_unshare+0x342/0x760 kernel/fork.c:3322
 __do_sys_unshare kernel/fork.c:3393 [inline]
 __se_sys_unshare kernel/fork.c:3391 [inline]
 __x64_sys_unshare+0x1f/0x30 kernel/fork.c:3391
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x4f/0x110 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x46/0x4e
RIP: 0033:0x7f30d0febe5d
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 9f 1b 00 f7 d8 64 89 01 48
RSP: 002b:00007f30cfba7cc8 EFLAGS: 00000246 ORIG_RAX: 0000000000000110
RAX: ffffffffffffffda RBX: 00000000004bbf80 RCX: 00007f30d0febe5d
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000006c020600
RBP: 00000000004bbf80 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
R13: 000000000000000b R14: 00007f30d104c530 R15: 0000000000000000
 &lt;/TASK&gt;</Note>
    </Notes>
    <CVE>CVE-2024-36939</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36939.html</URL>
        <Description>CVE-2024-36939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225838</URL>
        <Description>SUSE Bug 1225838</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="110">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: nl80211: don't free NULL coalescing rule

If the parsing fails, we can dereference a NULL pointer here.</Note>
    </Notes>
    <CVE>CVE-2024-36941</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36941.html</URL>
        <Description>CVE-2024-36941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225835</URL>
        <Description>SUSE Bug 1225835</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="111">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Move NPIV's transport unregistration to after resource clean up

There are cases after NPIV deletion where the fabric switch still believes
the NPIV is logged into the fabric.  This occurs when a vport is
unregistered before the Remove All DA_ID CT and LOGO ELS are sent to the
fabric.

Currently fc_remove_host(), which calls dev_loss_tmo for all D_IDs including
the fabric D_ID, removes the last ndlp reference and frees the ndlp rport
object.  This sometimes causes the race condition where the final DA_ID and
LOGO are skipped from being sent to the fabric switch.

Fix by moving the fc_remove_host() and scsi_remove_host() calls after DA_ID
and LOGO are sent.</Note>
    </Notes>
    <CVE>CVE-2024-36952</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36952.html</URL>
        <Description>CVE-2024-36952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225898</URL>
        <Description>SUSE Bug 1225898</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="112">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: openvswitch: fix overwriting ct original tuple for ICMPv6

OVS_PACKET_CMD_EXECUTE has 3 main attributes:
 - OVS_PACKET_ATTR_KEY - Packet metadata in a netlink format.
 - OVS_PACKET_ATTR_PACKET - Binary packet content.
 - OVS_PACKET_ATTR_ACTIONS - Actions to execute on the packet.

OVS_PACKET_ATTR_KEY is parsed first to populate sw_flow_key structure
with the metadata like conntrack state, input port, recirculation id,
etc.  Then the packet itself gets parsed to populate the rest of the
keys from the packet headers.

Whenever the packet parsing code starts parsing the ICMPv6 header, it
first zeroes out fields in the key corresponding to Neighbor Discovery
information even if it is not an ND packet.

It is an 'ipv6.nd' field.  However, the 'ipv6' is a union that shares
the space between 'nd' and 'ct_orig' that holds the original tuple
conntrack metadata parsed from the OVS_PACKET_ATTR_KEY.

ND packets should not normally have conntrack state, so it's fine to
share the space, but normal ICMPv6 Echo packets or maybe other types of
ICMPv6 can have the state attached and it should not be overwritten.

The issue results in all but the last 4 bytes of the destination
address being wiped from the original conntrack tuple leading to
incorrect packet matching and potentially executing wrong actions
in case this packet recirculates within the datapath or goes back
to userspace.

ND fields should not be accessed in non-ND packets, so not clearing
them should be fine.  Executing memset() only for actual ND packets to
avoid the issue.

Initializing the whole thing before parsing is needed because ND packet
may not contain all the options.

The issue only affects the OVS_PACKET_CMD_EXECUTE path and doesn't
affect packets entering OVS datapath from network interfaces, because
in this case CT metadata is populated from skb after the packet is
already parsed.</Note>
    </Notes>
    <CVE>CVE-2024-38558</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38558.html</URL>
        <Description>CVE-2024-38558</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226783</URL>
        <Description>SUSE Bug 1226783</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="113">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: bfa: Ensure the copied buf is NUL terminated

Currently, we allocate a nbytes-sized kernel buffer and copy nbytes from
userspace to that buffer. Later, we use sscanf on this buffer but we don't
ensure that the string is terminated inside the buffer, this can lead to
OOB read when using sscanf. Fix this issue by using memdup_user_nul instead
of memdup_user.</Note>
    </Notes>
    <CVE>CVE-2024-38560</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38560.html</URL>
        <Description>CVE-2024-38560</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226786</URL>
        <Description>SUSE Bug 1226786</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227319</URL>
        <Description>SUSE Bug 1227319</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="114">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

md: fix resync softlockup when bitmap size is less than array size

Is is reported that for dm-raid10, lvextend + lvchange --syncaction will
trigger following softlockup:

kernel:watchdog: BUG: soft lockup - CPU#3 stuck for 26s! [mdX_resync:6976]
CPU: 7 PID: 3588 Comm: mdX_resync Kdump: loaded Not tainted 6.9.0-rc4-next-20240419 #1
RIP: 0010:_raw_spin_unlock_irq+0x13/0x30
Call Trace:
 &lt;TASK&gt;
 md_bitmap_start_sync+0x6b/0xf0
 raid10_sync_request+0x25c/0x1b40 [raid10]
 md_do_sync+0x64b/0x1020
 md_thread+0xa7/0x170
 kthread+0xcf/0x100
 ret_from_fork+0x30/0x50
 ret_from_fork_asm+0x1a/0x30

And the detailed process is as follows:

md_do_sync
 j = mddev-&gt;resync_min
 while (j &lt; max_sectors)
  sectors = raid10_sync_request(mddev, j, &amp;skipped)
   if (!md_bitmap_start_sync(..., &amp;sync_blocks))
    // md_bitmap_start_sync set sync_blocks to 0
    return sync_blocks + sectors_skippe;
  // sectors = 0;
  j += sectors;
  // j never change

Root cause is that commit 301867b1c168 ("md/raid10: check
slab-out-of-bounds in md_bitmap_get_counter") return early from
md_bitmap_get_counter(), without setting returned blocks.

Fix this problem by always set returned blocks from
md_bitmap_get_counter"(), as it used to be.

Noted that this patch just fix the softlockup problem in kernel, the
case that bitmap size doesn't match array size still need to be fixed.</Note>
    </Notes>
    <CVE>CVE-2024-38598</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38598.html</URL>
        <Description>CVE-2024-38598</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226757</URL>
        <Description>SUSE Bug 1226757</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="115">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

usb-storage: alauda: Check whether the media is initialized

The member "uzonesize" of struct alauda_info will remain 0
if alauda_init_media() fails, potentially causing divide errors
in alauda_read_data() and alauda_write_lba().
- Add a member "media_initialized" to struct alauda_info.
- Change a condition in alauda_check_media() to ensure the
  first initialization.
- Add an error check for the return value of alauda_init_media().</Note>
    </Notes>
    <CVE>CVE-2024-38619</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38619.html</URL>
        <Description>CVE-2024-38619</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226861</URL>
        <Description>SUSE Bug 1226861</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="116">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger

When the cpu5wdt module is removing, the origin code uses del_timer() to
de-activate the timer. If the timer handler is running, del_timer() could
not stop it and will return directly. If the port region is released by
release_region() and then the timer handler cpu5wdt_trigger() calls outb()
to write into the region that is released, the use-after-free bug will
happen.

Change del_timer() to timer_shutdown_sync() in order that the timer handler
could be finished before the port region is released.</Note>
    </Notes>
    <CVE>CVE-2024-38630</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38630.html</URL>
        <Description>CVE-2024-38630</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226908</URL>
        <Description>SUSE Bug 1226908</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="117">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/9p: fix uninit-value in p9_client_rpc()

Syzbot with the help of KMSAN reported the following error:

BUG: KMSAN: uninit-value in trace_9p_client_res include/trace/events/9p.h:146 [inline]
BUG: KMSAN: uninit-value in p9_client_rpc+0x1314/0x1340 net/9p/client.c:754
 trace_9p_client_res include/trace/events/9p.h:146 [inline]
 p9_client_rpc+0x1314/0x1340 net/9p/client.c:754
 p9_client_create+0x1551/0x1ff0 net/9p/client.c:1031
 v9fs_session_init+0x1b9/0x28e0 fs/9p/v9fs.c:410
 v9fs_mount+0xe2/0x12b0 fs/9p/vfs_super.c:122
 legacy_get_tree+0x114/0x290 fs/fs_context.c:662
 vfs_get_tree+0xa7/0x570 fs/super.c:1797
 do_new_mount+0x71f/0x15e0 fs/namespace.c:3352
 path_mount+0x742/0x1f20 fs/namespace.c:3679
 do_mount fs/namespace.c:3692 [inline]
 __do_sys_mount fs/namespace.c:3898 [inline]
 __se_sys_mount+0x725/0x810 fs/namespace.c:3875
 __x64_sys_mount+0xe4/0x150 fs/namespace.c:3875
 do_syscall_64+0xd5/0x1f0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

Uninit was created at:
 __alloc_pages+0x9d6/0xe70 mm/page_alloc.c:4598
 __alloc_pages_node include/linux/gfp.h:238 [inline]
 alloc_pages_node include/linux/gfp.h:261 [inline]
 alloc_slab_page mm/slub.c:2175 [inline]
 allocate_slab mm/slub.c:2338 [inline]
 new_slab+0x2de/0x1400 mm/slub.c:2391
 ___slab_alloc+0x1184/0x33d0 mm/slub.c:3525
 __slab_alloc mm/slub.c:3610 [inline]
 __slab_alloc_node mm/slub.c:3663 [inline]
 slab_alloc_node mm/slub.c:3835 [inline]
 kmem_cache_alloc+0x6d3/0xbe0 mm/slub.c:3852
 p9_tag_alloc net/9p/client.c:278 [inline]
 p9_client_prepare_req+0x20a/0x1770 net/9p/client.c:641
 p9_client_rpc+0x27e/0x1340 net/9p/client.c:688
 p9_client_create+0x1551/0x1ff0 net/9p/client.c:1031
 v9fs_session_init+0x1b9/0x28e0 fs/9p/v9fs.c:410
 v9fs_mount+0xe2/0x12b0 fs/9p/vfs_super.c:122
 legacy_get_tree+0x114/0x290 fs/fs_context.c:662
 vfs_get_tree+0xa7/0x570 fs/super.c:1797
 do_new_mount+0x71f/0x15e0 fs/namespace.c:3352
 path_mount+0x742/0x1f20 fs/namespace.c:3679
 do_mount fs/namespace.c:3692 [inline]
 __do_sys_mount fs/namespace.c:3898 [inline]
 __se_sys_mount+0x725/0x810 fs/namespace.c:3875
 __x64_sys_mount+0xe4/0x150 fs/namespace.c:3875
 do_syscall_64+0xd5/0x1f0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

If p9_check_errors() fails early in p9_client_rpc(), req-&gt;rc.tag
will not be properly initialized. However, trace_9p_client_res()
ends up trying to print it out anyway before p9_client_rpc()
finishes.

Fix this issue by assigning default values to p9_fcall fields
such as 'tag' and (just in case KMSAN unearths something new) 'id'
during the tag allocation stage.</Note>
    </Notes>
    <CVE>CVE-2024-39301</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-39301.html</URL>
        <Description>CVE-2024-39301</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226994</URL>
        <Description>SUSE Bug 1226994</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="118">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

fbdev: savage: Handle err return when savagefb_check_var failed

The commit 04e5eac8f3ab("fbdev: savage: Error out if pixclock equals zero")
checks the value of pixclock to avoid divide-by-zero error. However
the function savagefb_probe doesn't handle the error return of
savagefb_check_var. When pixclock is 0, it will cause divide-by-zero error.</Note>
    </Notes>
    <CVE>CVE-2024-39475</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-39475.html</URL>
        <Description>CVE-2024-39475</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227435</URL>
        <Description>SUSE Bug 1227435</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="119">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set()

In function bond_option_arp_ip_targets_set(), if newval-&gt;string is an
empty string, newval-&gt;string+1 will point to the byte after the
string, causing an out-of-bound read.

BUG: KASAN: slab-out-of-bounds in strlen+0x7d/0xa0 lib/string.c:418
Read of size 1 at addr ffff8881119c4781 by task syz-executor665/8107
CPU: 1 PID: 8107 Comm: syz-executor665 Not tainted 6.7.0-rc7 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xd9/0x150 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:364 [inline]
 print_report+0xc1/0x5e0 mm/kasan/report.c:475
 kasan_report+0xbe/0xf0 mm/kasan/report.c:588
 strlen+0x7d/0xa0 lib/string.c:418
 __fortify_strlen include/linux/fortify-string.h:210 [inline]
 in4_pton+0xa3/0x3f0 net/core/utils.c:130
 bond_option_arp_ip_targets_set+0xc2/0x910
drivers/net/bonding/bond_options.c:1201
 __bond_opt_set+0x2a4/0x1030 drivers/net/bonding/bond_options.c:767
 __bond_opt_set_notify+0x48/0x150 drivers/net/bonding/bond_options.c:792
 bond_opt_tryset_rtnl+0xda/0x160 drivers/net/bonding/bond_options.c:817
 bonding_sysfs_store_option+0xa1/0x120 drivers/net/bonding/bond_sysfs.c:156
 dev_attr_store+0x54/0x80 drivers/base/core.c:2366
 sysfs_kf_write+0x114/0x170 fs/sysfs/file.c:136
 kernfs_fop_write_iter+0x337/0x500 fs/kernfs/file.c:334
 call_write_iter include/linux/fs.h:2020 [inline]
 new_sync_write fs/read_write.c:491 [inline]
 vfs_write+0x96a/0xd80 fs/read_write.c:584
 ksys_write+0x122/0x250 fs/read_write.c:637
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x40/0x110 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b
---[ end trace ]---

Fix it by adding a check of string length before using it.</Note>
    </Notes>
    <CVE>CVE-2024-39487</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-39487.html</URL>
        <Description>CVE-2024-39487</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227573</URL>
        <Description>SUSE Bug 1227573</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="120">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY

When CONFIG_DEBUG_BUGVERBOSE=n, we fail to add necessary padding bytes
to bug_table entries, and as a result the last entry in a bug table will
be ignored, potentially leading to an unexpected panic(). All prior
entries in the table will be handled correctly.

The arm64 ABI requires that struct fields of up to 8 bytes are
naturally-aligned, with padding added within a struct such that struct
are suitably aligned within arrays.

When CONFIG_DEBUG_BUGVERPOSE=y, the layout of a bug_entry is:

	struct bug_entry {
		signed int      bug_addr_disp;	// 4 bytes
		signed int      file_disp;	// 4 bytes
		unsigned short  line;		// 2 bytes
		unsigned short  flags;		// 2 bytes
	}

... with 12 bytes total, requiring 4-byte alignment.

When CONFIG_DEBUG_BUGVERBOSE=n, the layout of a bug_entry is:

	struct bug_entry {
		signed int      bug_addr_disp;	// 4 bytes
		unsigned short  flags;		// 2 bytes
		&lt; implicit padding &gt;		// 2 bytes
	}

... with 8 bytes total, with 6 bytes of data and 2 bytes of trailing
padding, requiring 4-byte alginment.

When we create a bug_entry in assembly, we align the start of the entry
to 4 bytes, which implicitly handles padding for any prior entries.
However, we do not align the end of the entry, and so when
CONFIG_DEBUG_BUGVERBOSE=n, the final entry lacks the trailing padding
bytes.

For the main kernel image this is not a problem as find_bug() doesn't
depend on the trailing padding bytes when searching for entries:

	for (bug = __start___bug_table; bug &lt; __stop___bug_table; ++bug)
		if (bugaddr == bug_addr(bug))
			return bug;

However for modules, module_bug_finalize() depends on the trailing
bytes when calculating the number of entries:

	mod-&gt;num_bugs = sechdrs[i].sh_size / sizeof(struct bug_entry);

... and as the last bug_entry lacks the necessary padding bytes, this entry
will not be counted, e.g. in the case of a single entry:

	sechdrs[i].sh_size == 6
	sizeof(struct bug_entry) == 8;

	sechdrs[i].sh_size / sizeof(struct bug_entry) == 0;

Consequently module_find_bug() will miss the last bug_entry when it does:

	for (i = 0; i &lt; mod-&gt;num_bugs; ++i, ++bug)
		if (bugaddr == bug_addr(bug))
			goto out;

... which can lead to a kenrel panic due to an unhandled bug.

This can be demonstrated with the following module:

	static int __init buginit(void)
	{
		WARN(1, "hello\n");
		return 0;
	}

	static void __exit bugexit(void)
	{
	}

	module_init(buginit);
	module_exit(bugexit);
	MODULE_LICENSE("GPL");

... which will trigger a kernel panic when loaded:

	------------[ cut here ]------------
	hello
	Unexpected kernel BRK exception at EL1
	Internal error: BRK handler: 00000000f2000800 [#1] PREEMPT SMP
	Modules linked in: hello(O+)
	CPU: 0 PID: 50 Comm: insmod Tainted: G           O       6.9.1 #8
	Hardware name: linux,dummy-virt (DT)
	pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
	pc : buginit+0x18/0x1000 [hello]
	lr : buginit+0x18/0x1000 [hello]
	sp : ffff800080533ae0
	x29: ffff800080533ae0 x28: 0000000000000000 x27: 0000000000000000
	x26: ffffaba8c4e70510 x25: ffff800080533c30 x24: ffffaba8c4a28a58
	x23: 0000000000000000 x22: 0000000000000000 x21: ffff3947c0eab3c0
	x20: ffffaba8c4e3f000 x19: ffffaba846464000 x18: 0000000000000006
	x17: 0000000000000000 x16: ffffaba8c2492834 x15: 0720072007200720
	x14: 0720072007200720 x13: ffffaba8c49b27c8 x12: 0000000000000312
	x11: 0000000000000106 x10: ffffaba8c4a0a7c8 x9 : ffffaba8c49b27c8
	x8 : 00000000ffffefff x7 : ffffaba8c4a0a7c8 x6 : 80000000fffff000
	x5 : 0000000000000107 x4 : 0000000000000000 x3 : 0000000000000000
	x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff3947c0eab3c0
	Call trace:
	 buginit+0x18/0x1000 [hello]
	 do_one_initcall+0x80/0x1c8
	 do_init_module+0x60/0x218
	 load_module+0x1ba4/0x1d70
	 __do_sys_init_module+0x198/0x1d0
	 __arm64_sys_init_module+0x1c/0x28
	 invoke_syscall+0x48/0x114
	 el0_svc
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-39488</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-39488.html</URL>
        <Description>CVE-2024-39488</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227618</URL>
        <Description>SUSE Bug 1227618</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="121">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ipv6: sr: fix missing sk_buff release in seg6_input_core

The seg6_input() function is responsible for adding the SRH into a
packet, delegating the operation to the seg6_input_core(). This function
uses the skb_cow_head() to ensure that there is sufficient headroom in
the sk_buff for accommodating the link-layer header.
In the event that the skb_cow_header() function fails, the
seg6_input_core() catches the error but it does not release the sk_buff,
which will result in a memory leak.

This issue was introduced in commit af3b5158b89d ("ipv6: sr: fix BUG due
to headroom too small after SRH push") and persists even after commit
7a3f5b0de364 ("netfilter: add netfilter hooks to SRv6 data plane"),
where the entire seg6_input() code was refactored to deal with netfilter
hooks.

The proposed patch addresses the identified memory leak by requiring the
seg6_input_core() function to release the sk_buff in the event that
skb_cow_head() fails.</Note>
    </Notes>
    <CVE>CVE-2024-39490</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-39490.html</URL>
        <Description>CVE-2024-39490</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227626</URL>
        <Description>SUSE Bug 1227626</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="122">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ima: Fix use-after-free on a dentry's dname.name

-&gt;d_name.name can change on rename and the earlier value can be freed;
there are conditions sufficient to stabilize it (-&gt;d_lock on dentry,
-&gt;d_lock on its parent, -&gt;i_rwsem exclusive on the parent's inode,
rename_lock), but none of those are met at any of the sites. Take a stable
snapshot of the name instead.</Note>
    </Notes>
    <CVE>CVE-2024-39494</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-39494.html</URL>
        <Description>CVE-2024-39494</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227716</URL>
        <Description>SUSE Bug 1227716</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227901</URL>
        <Description>SUSE Bug 1227901</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="123">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

vmci: prevent speculation leaks by sanitizing event in event_deliver()

Coverity spotted that event_msg is controlled by user-space,
event_msg-&gt;event_data.event is passed to event_deliver() and used
as an index without sanitization.

This change ensures that the event index is sanitized to mitigate any
possibility of speculative information leaks.

This bug was discovered and resolved using Coverity Static Analysis
Security Testing (SAST) by Synopsys, Inc.

Only compile tested, no access to HW.</Note>
    </Notes>
    <CVE>CVE-2024-39499</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-39499.html</URL>
        <Description>CVE-2024-39499</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227725</URL>
        <Description>SUSE Bug 1227725</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="124">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drivers: core: synchronize really_probe() and dev_uevent()

Synchronize the dev-&gt;driver usage in really_probe() and dev_uevent().
These can run in different threads, what can result in the following
race condition for dev-&gt;driver uninitialization:

Thread #1:
==========

really_probe() {
...
probe_failed:
...
device_unbind_cleanup(dev) {
    ...
    dev-&gt;driver = NULL;   // &lt;= Failed probe sets dev-&gt;driver to NULL
    ...
    }
...
}

Thread #2:
==========

dev_uevent() {
...
if (dev-&gt;driver)
      // If dev-&gt;driver is NULLed from really_probe() from here on,
      // after above check, the system crashes
      add_uevent_var(env, "DRIVER=%s", dev-&gt;driver-&gt;name);
...
}

really_probe() holds the lock, already. So nothing needs to be done
there. dev_uevent() is called with lock held, often, too. But not
always. What implies that we can't add any locking in dev_uevent()
itself. So fix this race by adding the lock to the non-protected
path. This is the path where above race is observed:

 dev_uevent+0x235/0x380
 uevent_show+0x10c/0x1f0  &lt;= Add lock here
 dev_attr_show+0x3a/0xa0
 sysfs_kf_seq_show+0x17c/0x250
 kernfs_seq_show+0x7c/0x90
 seq_read_iter+0x2d7/0x940
 kernfs_fop_read_iter+0xc6/0x310
 vfs_read+0x5bc/0x6b0
 ksys_read+0xeb/0x1b0
 __x64_sys_read+0x42/0x50
 x64_sys_call+0x27ad/0x2d30
 do_syscall_64+0xcd/0x1d0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Similar cases are reported by syzkaller in

https://syzkaller.appspot.com/bug?extid=ffa8143439596313a85a

But these are regarding the *initialization* of dev-&gt;driver

dev-&gt;driver = drv;

As this switches dev-&gt;driver to non-NULL these reports can be considered
to be false-positives (which should be "fixed" by this commit, as well,
though).

The same issue was reported and tried to be fixed back in 2015 in

https://lore.kernel.org/lkml/1421259054-2574-1-git-send-email-a.sangwan@samsung.com/

already.</Note>
    </Notes>
    <CVE>CVE-2024-39501</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-39501.html</URL>
        <Description>CVE-2024-39501</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227754</URL>
        <Description>SUSE Bug 1227754</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="125">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet

In lio_vf_rep_copy_packet() pg_info-&gt;page is compared to a NULL value,
but then it is unconditionally passed to skb_add_rx_frag() which looks
strange and could lead to null pointer dereference.

lio_vf_rep_copy_packet() call trace looks like:
	octeon_droq_process_packets
	 octeon_droq_fast_process_packets
	  octeon_droq_dispatch_pkt
	   octeon_create_recv_info
	    ...search in the dispatch_list...
	     -&gt;disp_fn(rdisp-&gt;rinfo, ...)
	      lio_vf_rep_pkt_recv(struct octeon_recv_info *recv_info, ...)
In this path there is no code which sets pg_info-&gt;page to NULL.
So this check looks unneeded and doesn't solve potential problem.
But I guess the author had reason to add a check and I have no such card
and can't do real test.
In addition, the code in the function liquidio_push_packet() in
liquidio/lio_core.c does exactly the same.

Based on this, I consider the most acceptable compromise solution to
adjust this issue by moving skb_add_rx_frag() into conditional scope.

Found by Linux Verification Center (linuxtesting.org) with SVACE.</Note>
    </Notes>
    <CVE>CVE-2024-39506</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-39506.html</URL>
        <Description>CVE-2024-39506</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227729</URL>
        <Description>SUSE Bug 1227729</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="126">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: hns3: fix kernel crash problem in concurrent scenario

When link status change, the nic driver need to notify the roce
driver to handle this event, but at this time, the roce driver
may uninit, then cause kernel crash.

To fix the problem, when link status change, need to check
whether the roce registered, and when uninit, need to wait link
update finish.</Note>
    </Notes>
    <CVE>CVE-2024-39507</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-39507.html</URL>
        <Description>CVE-2024-39507</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227730</URL>
        <Description>SUSE Bug 1227730</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="127">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

HID: core: remove unnecessary WARN_ON() in implement()

Syzkaller hit a warning [1] in a call to implement() when trying
to write a value into a field of smaller size in an output report.

Since implement() already has a warn message printed out with the
help of hid_warn() and value in question gets trimmed with:
	...
	value &amp;= m;
	...
WARN_ON may be considered superfluous. Remove it to suppress future
syzkaller triggers.

[1]
WARNING: CPU: 0 PID: 5084 at drivers/hid/hid-core.c:1451 implement drivers/hid/hid-core.c:1451 [inline]
WARNING: CPU: 0 PID: 5084 at drivers/hid/hid-core.c:1451 hid_output_report+0x548/0x760 drivers/hid/hid-core.c:1863
Modules linked in:
CPU: 0 PID: 5084 Comm: syz-executor424 Not tainted 6.9.0-rc7-syzkaller-00183-gcf87f46fd34d #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
RIP: 0010:implement drivers/hid/hid-core.c:1451 [inline]
RIP: 0010:hid_output_report+0x548/0x760 drivers/hid/hid-core.c:1863
...
Call Trace:
 &lt;TASK&gt;
 __usbhid_submit_report drivers/hid/usbhid/hid-core.c:591 [inline]
 usbhid_submit_report+0x43d/0x9e0 drivers/hid/usbhid/hid-core.c:636
 hiddev_ioctl+0x138b/0x1f00 drivers/hid/usbhid/hiddev.c:726
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:904 [inline]
 __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:890
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
...</Note>
    </Notes>
    <CVE>CVE-2024-39509</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-39509.html</URL>
        <Description>CVE-2024-39509</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227733</URL>
        <Description>SUSE Bug 1227733</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="128">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory

There is a potential out-of-bounds access when using test_bit() on a single
word. The test_bit() and set_bit() functions operate on long values, and
when testing or setting a single word, they can exceed the word
boundary. KASAN detects this issue and produces a dump:

	 BUG: KASAN: slab-out-of-bounds in _scsih_add_device.constprop.0 (./arch/x86/include/asm/bitops.h:60 ./include/asm-generic/bitops/instrumented-atomic.h:29 drivers/scsi/mpt3sas/mpt3sas_scsih.c:7331) mpt3sas

	 Write of size 8 at addr ffff8881d26e3c60 by task kworker/u1536:2/2965

For full log, please look at [1].

Make the allocation at least the size of sizeof(unsigned long) so that
set_bit() and test_bit() have sufficient room for read/write operations
without overwriting unallocated memory.

[1] Link: https://lore.kernel.org/all/ZkNcALr3W3KGYYJG@gmail.com/</Note>
    </Notes>
    <CVE>CVE-2024-40901</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-40901.html</URL>
        <Description>CVE-2024-40901</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227762</URL>
        <Description>SUSE Bug 1227762</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="129">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages

The syzbot fuzzer found that the interrupt-URB completion callback in
the cdc-wdm driver was taking too long, and the driver's immediate
resubmission of interrupt URBs with -EPROTO status combined with the
dummy-hcd emulation to cause a CPU lockup:

cdc_wdm 1-1:1.0: nonzero urb status received: -71
cdc_wdm 1-1:1.0: wdm_int_callback - 0 bytes
watchdog: BUG: soft lockup - CPU#0 stuck for 26s! [syz-executor782:6625]
CPU#0 Utilization every 4s during lockup:
	#1:  98% system,	  0% softirq,	  3% hardirq,	  0% idle
	#2:  98% system,	  0% softirq,	  3% hardirq,	  0% idle
	#3:  98% system,	  0% softirq,	  3% hardirq,	  0% idle
	#4:  98% system,	  0% softirq,	  3% hardirq,	  0% idle
	#5:  98% system,	  1% softirq,	  3% hardirq,	  0% idle
Modules linked in:
irq event stamp: 73096
hardirqs last  enabled at (73095): [&lt;ffff80008037bc00&gt;] console_emit_next_record kernel/printk/printk.c:2935 [inline]
hardirqs last  enabled at (73095): [&lt;ffff80008037bc00&gt;] console_flush_all+0x650/0xb74 kernel/printk/printk.c:2994
hardirqs last disabled at (73096): [&lt;ffff80008af10b00&gt;] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline]
hardirqs last disabled at (73096): [&lt;ffff80008af10b00&gt;] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:551
softirqs last  enabled at (73048): [&lt;ffff8000801ea530&gt;] softirq_handle_end kernel/softirq.c:400 [inline]
softirqs last  enabled at (73048): [&lt;ffff8000801ea530&gt;] handle_softirqs+0xa60/0xc34 kernel/softirq.c:582
softirqs last disabled at (73043): [&lt;ffff800080020de8&gt;] __do_softirq+0x14/0x20 kernel/softirq.c:588
CPU: 0 PID: 6625 Comm: syz-executor782 Tainted: G        W          6.10.0-rc2-syzkaller-g8867bbd4a056 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024

Testing showed that the problem did not occur if the two error
messages -- the first two lines above -- were removed; apparently adding
material to the kernel log takes a surprisingly large amount of time.

In any case, the best approach for preventing these lockups and to
avoid spamming the log with thousands of error messages per second is
to ratelimit the two dev_err() calls.  Therefore we replace them with
dev_err_ratelimited().</Note>
    </Notes>
    <CVE>CVE-2024-40904</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-40904.html</URL>
        <Description>CVE-2024-40904</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227772</URL>
        <Description>SUSE Bug 1227772</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="130">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup()

The ieee80211_sta_ps_deliver_wakeup() function takes sta-&gt;ps_lock to
synchronizes with ieee80211_tx_h_unicast_ps_buf() which is called from
softirq context. However using only spin_lock() to get sta-&gt;ps_lock in
ieee80211_sta_ps_deliver_wakeup() does not prevent softirq to execute
on this same CPU, to run ieee80211_tx_h_unicast_ps_buf() and try to
take this same lock ending in deadlock. Below is an example of rcu stall
that arises in such situation.

 rcu: INFO: rcu_sched self-detected stall on CPU
 rcu:    2-....: (42413413 ticks this GP) idle=b154/1/0x4000000000000000 softirq=1763/1765 fqs=21206996
 rcu:    (t=42586894 jiffies g=2057 q=362405 ncpus=4)
 CPU: 2 PID: 719 Comm: wpa_supplicant Tainted: G        W          6.4.0-02158-g1b062f552873 #742
 Hardware name: RPT (r1) (DT)
 pstate: 00000005 (nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : queued_spin_lock_slowpath+0x58/0x2d0
 lr : invoke_tx_handlers_early+0x5b4/0x5c0
 sp : ffff00001ef64660
 x29: ffff00001ef64660 x28: ffff000009bc1070 x27: ffff000009bc0ad8
 x26: ffff000009bc0900 x25: ffff00001ef647a8 x24: 0000000000000000
 x23: ffff000009bc0900 x22: ffff000009bc0900 x21: ffff00000ac0e000
 x20: ffff00000a279e00 x19: ffff00001ef646e8 x18: 0000000000000000
 x17: ffff800016468000 x16: ffff00001ef608c0 x15: 0010533c93f64f80
 x14: 0010395c9faa3946 x13: 0000000000000000 x12: 00000000fa83b2da
 x11: 000000012edeceea x10: ffff0000010fbe00 x9 : 0000000000895440
 x8 : 000000000010533c x7 : ffff00000ad8b740 x6 : ffff00000c350880
 x5 : 0000000000000007 x4 : 0000000000000001 x3 : 0000000000000000
 x2 : 0000000000000000 x1 : 0000000000000001 x0 : ffff00000ac0e0e8
 Call trace:
  queued_spin_lock_slowpath+0x58/0x2d0
  ieee80211_tx+0x80/0x12c
  ieee80211_tx_pending+0x110/0x278
  tasklet_action_common.constprop.0+0x10c/0x144
  tasklet_action+0x20/0x28
  _stext+0x11c/0x284
  ____do_softirq+0xc/0x14
  call_on_irq_stack+0x24/0x34
  do_softirq_own_stack+0x18/0x20
  do_softirq+0x74/0x7c
  __local_bh_enable_ip+0xa0/0xa4
  _ieee80211_wake_txqs+0x3b0/0x4b8
  __ieee80211_wake_queue+0x12c/0x168
  ieee80211_add_pending_skbs+0xec/0x138
  ieee80211_sta_ps_deliver_wakeup+0x2a4/0x480
  ieee80211_mps_sta_status_update.part.0+0xd8/0x11c
  ieee80211_mps_sta_status_update+0x18/0x24
  sta_apply_parameters+0x3bc/0x4c0
  ieee80211_change_station+0x1b8/0x2dc
  nl80211_set_station+0x444/0x49c
  genl_family_rcv_msg_doit.isra.0+0xa4/0xfc
  genl_rcv_msg+0x1b0/0x244
  netlink_rcv_skb+0x38/0x10c
  genl_rcv+0x34/0x48
  netlink_unicast+0x254/0x2bc
  netlink_sendmsg+0x190/0x3b4
  ____sys_sendmsg+0x1e8/0x218
  ___sys_sendmsg+0x68/0x8c
  __sys_sendmsg+0x44/0x84
  __arm64_sys_sendmsg+0x20/0x28
  do_el0_svc+0x6c/0xe8
  el0_svc+0x14/0x48
  el0t_64_sync_handler+0xb0/0xb4
  el0t_64_sync+0x14c/0x150

Using spin_lock_bh()/spin_unlock_bh() instead prevents softirq to raise
on the same CPU that is holding the lock.</Note>
    </Notes>
    <CVE>CVE-2024-40912</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-40912.html</URL>
        <Description>CVE-2024-40912</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227790</URL>
        <Description>SUSE Bug 1227790</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="131">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

vmxnet3: disable rx data ring on dma allocation failure

When vmxnet3_rq_create() fails to allocate memory for rq-&gt;data_ring.base,
the subsequent call to vmxnet3_rq_destroy_all_rxdataring does not reset
rq-&gt;data_ring.desc_size for the data ring that failed, which presumably
causes the hypervisor to reference it on packet reception.

To fix this bug, rq-&gt;data_ring.desc_size needs to be set to 0 to tell
the hypervisor to disable this feature.

[   95.436876] kernel BUG at net/core/skbuff.c:207!
[   95.439074] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
[   95.440411] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 6.9.3-dirty #1
[   95.441558] Hardware name: VMware, Inc. VMware Virtual
Platform/440BX Desktop Reference Platform, BIOS 6.00 12/12/2018
[   95.443481] RIP: 0010:skb_panic+0x4d/0x4f
[   95.444404] Code: 4f 70 50 8b 87 c0 00 00 00 50 8b 87 bc 00 00 00 50
ff b7 d0 00 00 00 4c 8b 8f c8 00 00 00 48 c7 c7 68 e8 be 9f e8 63 58 f9
ff &lt;0f&gt; 0b 48 8b 14 24 48 c7 c1 d0 73 65 9f e8 a1 ff ff ff 48 8b 14 24
[   95.447684] RSP: 0018:ffffa13340274dd0 EFLAGS: 00010246
[   95.448762] RAX: 0000000000000089 RBX: ffff8fbbc72b02d0 RCX: 000000000000083f
[   95.450148] RDX: 0000000000000000 RSI: 00000000000000f6 RDI: 000000000000083f
[   95.451520] RBP: 000000000000002d R08: 0000000000000000 R09: ffffa13340274c60
[   95.452886] R10: ffffffffa04ed468 R11: 0000000000000002 R12: 0000000000000000
[   95.454293] R13: ffff8fbbdab3c2d0 R14: ffff8fbbdbd829e0 R15: ffff8fbbdbd809e0
[   95.455682] FS:  0000000000000000(0000) GS:ffff8fbeefd80000(0000) knlGS:0000000000000000
[   95.457178] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   95.458340] CR2: 00007fd0d1f650c8 CR3: 0000000115f28000 CR4: 00000000000406f0
[   95.459791] Call Trace:
[   95.460515]  &lt;IRQ&gt;
[   95.461180]  ? __die_body.cold+0x19/0x27
[   95.462150]  ? die+0x2e/0x50
[   95.462976]  ? do_trap+0xca/0x110
[   95.463973]  ? do_error_trap+0x6a/0x90
[   95.464966]  ? skb_panic+0x4d/0x4f
[   95.465901]  ? exc_invalid_op+0x50/0x70
[   95.466849]  ? skb_panic+0x4d/0x4f
[   95.467718]  ? asm_exc_invalid_op+0x1a/0x20
[   95.468758]  ? skb_panic+0x4d/0x4f
[   95.469655]  skb_put.cold+0x10/0x10
[   95.470573]  vmxnet3_rq_rx_complete+0x862/0x11e0 [vmxnet3]
[   95.471853]  vmxnet3_poll_rx_only+0x36/0xb0 [vmxnet3]
[   95.473185]  __napi_poll+0x2b/0x160
[   95.474145]  net_rx_action+0x2c6/0x3b0
[   95.475115]  handle_softirqs+0xe7/0x2a0
[   95.476122]  __irq_exit_rcu+0x97/0xb0
[   95.477109]  common_interrupt+0x85/0xa0
[   95.478102]  &lt;/IRQ&gt;
[   95.478846]  &lt;TASK&gt;
[   95.479603]  asm_common_interrupt+0x26/0x40
[   95.480657] RIP: 0010:pv_native_safe_halt+0xf/0x20
[   95.481801] Code: 22 d7 e9 54 87 01 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d 93 ba 3b 00 fb f4 &lt;e9&gt; 2c 87 01 00 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90
[   95.485563] RSP: 0018:ffffa133400ffe58 EFLAGS: 00000246
[   95.486882] RAX: 0000000000004000 RBX: ffff8fbbc1d14064 RCX: 0000000000000000
[   95.488477] RDX: ffff8fbeefd80000 RSI: ffff8fbbc1d14000 RDI: 0000000000000001
[   95.490067] RBP: ffff8fbbc1d14064 R08: ffffffffa0652260 R09: 00000000000010d3
[   95.491683] R10: 0000000000000018 R11: ffff8fbeefdb4764 R12: ffffffffa0652260
[   95.493389] R13: ffffffffa06522e0 R14: 0000000000000001 R15: 0000000000000000
[   95.495035]  acpi_safe_halt+0x14/0x20
[   95.496127]  acpi_idle_do_entry+0x2f/0x50
[   95.497221]  acpi_idle_enter+0x7f/0xd0
[   95.498272]  cpuidle_enter_state+0x81/0x420
[   95.499375]  cpuidle_enter+0x2d/0x40
[   95.500400]  do_idle+0x1e5/0x240
[   95.501385]  cpu_startup_entry+0x29/0x30
[   95.502422]  start_secondary+0x11c/0x140
[   95.503454]  common_startup_64+0x13e/0x141
[   95.504466]  &lt;/TASK&gt;
[   95.505197] Modules linked in: nft_fib_inet nft_fib_ipv4
nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6
nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ip
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-40923</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-40923.html</URL>
        <Description>CVE-2024-40923</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227786</URL>
        <Description>SUSE Bug 1227786</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="132">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: check n_ssids before accessing the ssids

In some versions of cfg80211, the ssids poinet might be a valid one even
though n_ssids is 0. Accessing the pointer in this case will cuase an
out-of-bound access. Fix this by checking n_ssids first.</Note>
    </Notes>
    <CVE>CVE-2024-40929</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-40929.html</URL>
        <Description>CVE-2024-40929</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227774</URL>
        <Description>SUSE Bug 1227774</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="133">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/exynos/vidi: fix memory leak in .get_modes()

The duplicated EDID is never freed. Fix it.</Note>
    </Notes>
    <CVE>CVE-2024-40932</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-40932.html</URL>
        <Description>CVE-2024-40932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227828</URL>
        <Description>SUSE Bug 1227828</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="134">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

gve: Clear napi-&gt;skb before dev_kfree_skb_any()

gve_rx_free_skb incorrectly leaves napi-&gt;skb referencing an skb after it
is freed with dev_kfree_skb_any(). This can result in a subsequent call
to napi_get_frags returning a dangling pointer.

Fix this by clearing napi-&gt;skb before the skb is freed.</Note>
    </Notes>
    <CVE>CVE-2024-40937</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-40937.html</URL>
        <Description>CVE-2024-40937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227836</URL>
        <Description>SUSE Bug 1227836</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227903</URL>
        <Description>SUSE Bug 1227903</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="135">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: don't read past the mfuart notifcation

In case the firmware sends a notification that claims it has more data
than it has, we will read past that was allocated for the notification.
Remove the print of the buffer, we won't see it by default. If needed,
we can see the content with tracing.

This was reported by KFENCE.</Note>
    </Notes>
    <CVE>CVE-2024-40941</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-40941.html</URL>
        <Description>CVE-2024-40941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227771</URL>
        <Description>SUSE Bug 1227771</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="136">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects

The hwmp code use objects of type mesh_preq_queue, added to a list in
ieee80211_if_mesh, to keep track of mpath we need to resolve. If the mpath
gets deleted, ex mesh interface is removed, the entries in that list will
never get cleaned. Fix this by flushing all corresponding items of the
preq_queue in mesh_path_flush_pending().

This should take care of KASAN reports like this:

unreferenced object 0xffff00000668d800 (size 128):
  comm "kworker/u8:4", pid 67, jiffies 4295419552 (age 1836.444s)
  hex dump (first 32 bytes):
    00 1f 05 09 00 00 ff ff 00 d5 68 06 00 00 ff ff  ..........h.....
    8e 97 ea eb 3e b8 01 00 00 00 00 00 00 00 00 00  ....&gt;...........
  backtrace:
    [&lt;000000007302a0b6&gt;] __kmem_cache_alloc_node+0x1e0/0x35c
    [&lt;00000000049bd418&gt;] kmalloc_trace+0x34/0x80
    [&lt;0000000000d792bb&gt;] mesh_queue_preq+0x44/0x2a8
    [&lt;00000000c99c3696&gt;] mesh_nexthop_resolve+0x198/0x19c
    [&lt;00000000926bf598&gt;] ieee80211_xmit+0x1d0/0x1f4
    [&lt;00000000fc8c2284&gt;] __ieee80211_subif_start_xmit+0x30c/0x764
    [&lt;000000005926ee38&gt;] ieee80211_subif_start_xmit+0x9c/0x7a4
    [&lt;000000004c86e916&gt;] dev_hard_start_xmit+0x174/0x440
    [&lt;0000000023495647&gt;] __dev_queue_xmit+0xe24/0x111c
    [&lt;00000000cfe9ca78&gt;] batadv_send_skb_packet+0x180/0x1e4
    [&lt;000000007bacc5d5&gt;] batadv_v_elp_periodic_work+0x2f4/0x508
    [&lt;00000000adc3cd94&gt;] process_one_work+0x4b8/0xa1c
    [&lt;00000000b36425d1&gt;] worker_thread+0x9c/0x634
    [&lt;0000000005852dd5&gt;] kthread+0x1bc/0x1c4
    [&lt;000000005fccd770&gt;] ret_from_fork+0x10/0x20
unreferenced object 0xffff000009051f00 (size 128):
  comm "kworker/u8:4", pid 67, jiffies 4295419553 (age 1836.440s)
  hex dump (first 32 bytes):
    90 d6 92 0d 00 00 ff ff 00 d8 68 06 00 00 ff ff  ..........h.....
    36 27 92 e4 02 e0 01 00 00 58 79 06 00 00 ff ff  6'.......Xy.....
  backtrace:
    [&lt;000000007302a0b6&gt;] __kmem_cache_alloc_node+0x1e0/0x35c
    [&lt;00000000049bd418&gt;] kmalloc_trace+0x34/0x80
    [&lt;0000000000d792bb&gt;] mesh_queue_preq+0x44/0x2a8
    [&lt;00000000c99c3696&gt;] mesh_nexthop_resolve+0x198/0x19c
    [&lt;00000000926bf598&gt;] ieee80211_xmit+0x1d0/0x1f4
    [&lt;00000000fc8c2284&gt;] __ieee80211_subif_start_xmit+0x30c/0x764
    [&lt;000000005926ee38&gt;] ieee80211_subif_start_xmit+0x9c/0x7a4
    [&lt;000000004c86e916&gt;] dev_hard_start_xmit+0x174/0x440
    [&lt;0000000023495647&gt;] __dev_queue_xmit+0xe24/0x111c
    [&lt;00000000cfe9ca78&gt;] batadv_send_skb_packet+0x180/0x1e4
    [&lt;000000007bacc5d5&gt;] batadv_v_elp_periodic_work+0x2f4/0x508
    [&lt;00000000adc3cd94&gt;] process_one_work+0x4b8/0xa1c
    [&lt;00000000b36425d1&gt;] worker_thread+0x9c/0x634
    [&lt;0000000005852dd5&gt;] kthread+0x1bc/0x1c4
    [&lt;000000005fccd770&gt;] ret_from_fork+0x10/0x20</Note>
    </Notes>
    <CVE>CVE-2024-40942</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-40942.html</URL>
        <Description>CVE-2024-40942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227770</URL>
        <Description>SUSE Bug 1227770</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="137">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix races between hole punching and AIO+DIO

After commit "ocfs2: return real error code in ocfs2_dio_wr_get_block",
fstests/generic/300 become from always failed to sometimes failed:

========================================================================
[  473.293420 ] run fstests generic/300

[  475.296983 ] JBD2: Ignoring recovery information on journal
[  475.302473 ] ocfs2: Mounting device (253,1) on (node local, slot 0) with ordered data mode.
[  494.290998 ] OCFS2: ERROR (device dm-1): ocfs2_change_extent_flag: Owner 5668 has an extent at cpos 78723 which can no longer be found
[  494.291609 ] On-disk corruption discovered. Please run fsck.ocfs2 once the filesystem is unmounted.
[  494.292018 ] OCFS2: File system is now read-only.
[  494.292224 ] (kworker/19:11,2628,19):ocfs2_mark_extent_written:5272 ERROR: status = -30
[  494.292602 ] (kworker/19:11,2628,19):ocfs2_dio_end_io_write:2374 ERROR: status = -3
fio: io_u error on file /mnt/scratch/racer: Read-only file system: write offset=460849152, buflen=131072
=========================================================================

In __blockdev_direct_IO, ocfs2_dio_wr_get_block is called to add unwritten
extents to a list.  extents are also inserted into extent tree in
ocfs2_write_begin_nolock.  Then another thread call fallocate to puch a
hole at one of the unwritten extent.  The extent at cpos was removed by
ocfs2_remove_extent().  At end io worker thread, ocfs2_search_extent_list
found there is no such extent at the cpos.

    T1                        T2                T3
                              inode lock
                                ...
                                insert extents
                                ...
                              inode unlock
ocfs2_fallocate
 __ocfs2_change_file_space
  inode lock
  lock ip_alloc_sem
  ocfs2_remove_inode_range inode
   ocfs2_remove_btree_range
    ocfs2_remove_extent
    ^---remove the extent at cpos 78723
  ...
  unlock ip_alloc_sem
  inode unlock
                                       ocfs2_dio_end_io
                                        ocfs2_dio_end_io_write
                                         lock ip_alloc_sem
                                         ocfs2_mark_extent_written
                                          ocfs2_change_extent_flag
                                           ocfs2_search_extent_list
                                           ^---failed to find extent
                                          ...
                                          unlock ip_alloc_sem

In most filesystems, fallocate is not compatible with racing with AIO+DIO,
so fix it by adding to wait for all dio before fallocate/punch_hole like
ext4.</Note>
    </Notes>
    <CVE>CVE-2024-40943</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-40943.html</URL>
        <Description>CVE-2024-40943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227849</URL>
        <Description>SUSE Bug 1227849</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="138">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin()

Use {READ,WRITE}_ONCE() to access kvm-&gt;last_boosted_vcpu to ensure the
loads and stores are atomic.  In the extremely unlikely scenario the
compiler tears the stores, it's theoretically possible for KVM to attempt
to get a vCPU using an out-of-bounds index, e.g. if the write is split
into multiple 8-bit stores, and is paired with a 32-bit load on a VM with
257 vCPUs:

  CPU0                              CPU1
  last_boosted_vcpu = 0xff;

                                    (last_boosted_vcpu = 0x100)
                                    last_boosted_vcpu[15:8] = 0x01;
  i = (last_boosted_vcpu = 0x1ff)
                                    last_boosted_vcpu[7:0] = 0x00;

  vcpu = kvm-&gt;vcpu_array[0x1ff];

As detected by KCSAN:

  BUG: KCSAN: data-race in kvm_vcpu_on_spin [kvm] / kvm_vcpu_on_spin [kvm]

  write to 0xffffc90025a92344 of 4 bytes by task 4340 on cpu 16:
  kvm_vcpu_on_spin (arch/x86/kvm/../../../virt/kvm/kvm_main.c:4112) kvm
  handle_pause (arch/x86/kvm/vmx/vmx.c:5929) kvm_intel
  vmx_handle_exit (arch/x86/kvm/vmx/vmx.c:?
		 arch/x86/kvm/vmx/vmx.c:6606) kvm_intel
  vcpu_run (arch/x86/kvm/x86.c:11107 arch/x86/kvm/x86.c:11211) kvm
  kvm_arch_vcpu_ioctl_run (arch/x86/kvm/x86.c:?) kvm
  kvm_vcpu_ioctl (arch/x86/kvm/../../../virt/kvm/kvm_main.c:?) kvm
  __se_sys_ioctl (fs/ioctl.c:52 fs/ioctl.c:904 fs/ioctl.c:890)
  __x64_sys_ioctl (fs/ioctl.c:890)
  x64_sys_call (arch/x86/entry/syscall_64.c:33)
  do_syscall_64 (arch/x86/entry/common.c:?)
  entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)

  read to 0xffffc90025a92344 of 4 bytes by task 4342 on cpu 4:
  kvm_vcpu_on_spin (arch/x86/kvm/../../../virt/kvm/kvm_main.c:4069) kvm
  handle_pause (arch/x86/kvm/vmx/vmx.c:5929) kvm_intel
  vmx_handle_exit (arch/x86/kvm/vmx/vmx.c:?
			arch/x86/kvm/vmx/vmx.c:6606) kvm_intel
  vcpu_run (arch/x86/kvm/x86.c:11107 arch/x86/kvm/x86.c:11211) kvm
  kvm_arch_vcpu_ioctl_run (arch/x86/kvm/x86.c:?) kvm
  kvm_vcpu_ioctl (arch/x86/kvm/../../../virt/kvm/kvm_main.c:?) kvm
  __se_sys_ioctl (fs/ioctl.c:52 fs/ioctl.c:904 fs/ioctl.c:890)
  __x64_sys_ioctl (fs/ioctl.c:890)
  x64_sys_call (arch/x86/entry/syscall_64.c:33)
  do_syscall_64 (arch/x86/entry/common.c:?)
  entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)

  value changed: 0x00000012 -&gt; 0x00000000</Note>
    </Notes>
    <CVE>CVE-2024-40953</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-40953.html</URL>
        <Description>CVE-2024-40953</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227806</URL>
        <Description>SUSE Bug 1227806</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="139">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()

ip6_dst_idev() can return NULL, xfrm6_get_saddr() must act accordingly.

syzbot reported:

Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
CPU: 1 PID: 12 Comm: kworker/u8:1 Not tainted 6.10.0-rc2-syzkaller-00383-gb8481381d4e2 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
Workqueue: wg-kex-wg1 wg_packet_handshake_send_worker
 RIP: 0010:xfrm6_get_saddr+0x93/0x130 net/ipv6/xfrm6_policy.c:64
Code: df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 97 00 00 00 4c 8b ab d8 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c1 ea 03 &lt;80&gt; 3c 02 00 0f 85 86 00 00 00 4d 8b 6d 00 e8 ca 13 47 01 48 b8 00
RSP: 0018:ffffc90000117378 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: ffff88807b079dc0 RCX: ffffffff89a0d6d7
RDX: 0000000000000000 RSI: ffffffff89a0d6e9 RDI: ffff88807b079e98
RBP: ffff88807ad73248 R08: 0000000000000007 R09: fffffffffffff000
R10: ffff88807b079dc0 R11: 0000000000000007 R12: ffffc90000117480
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f4586d00440 CR3: 0000000079042000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  xfrm_get_saddr net/xfrm/xfrm_policy.c:2452 [inline]
  xfrm_tmpl_resolve_one net/xfrm/xfrm_policy.c:2481 [inline]
  xfrm_tmpl_resolve+0xa26/0xf10 net/xfrm/xfrm_policy.c:2541
  xfrm_resolve_and_create_bundle+0x140/0x2570 net/xfrm/xfrm_policy.c:2835
  xfrm_bundle_lookup net/xfrm/xfrm_policy.c:3070 [inline]
  xfrm_lookup_with_ifid+0x4d1/0x1e60 net/xfrm/xfrm_policy.c:3201
  xfrm_lookup net/xfrm/xfrm_policy.c:3298 [inline]
  xfrm_lookup_route+0x3b/0x200 net/xfrm/xfrm_policy.c:3309
  ip6_dst_lookup_flow+0x15c/0x1d0 net/ipv6/ip6_output.c:1256
  send6+0x611/0xd20 drivers/net/wireguard/socket.c:139
  wg_socket_send_skb_to_peer+0xf9/0x220 drivers/net/wireguard/socket.c:178
  wg_socket_send_buffer_to_peer+0x12b/0x190 drivers/net/wireguard/socket.c:200
  wg_packet_send_handshake_initiation+0x227/0x360 drivers/net/wireguard/send.c:40
  wg_packet_handshake_send_worker+0x1c/0x30 drivers/net/wireguard/send.c:51
  process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231
  process_scheduled_works kernel/workqueue.c:3312 [inline]
  worker_thread+0x6c8/0xf70 kernel/workqueue.c:3393
  kthread+0x2c1/0x3a0 kernel/kthread.c:389
  ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244</Note>
    </Notes>
    <CVE>CVE-2024-40959</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-40959.html</URL>
        <Description>CVE-2024-40959</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227884</URL>
        <Description>SUSE Bug 1227884</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="140">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tty: add the option to have a tty reject a new ldisc

... and use it to limit the virtual terminals to just N_TTY.  They are
kind of special, and in particular, the "con_write()" routine violates
the "writes cannot sleep" rule that some ldiscs rely on.

This avoids the

   BUG: sleeping function called from invalid context at kernel/printk/printk.c:2659

when N_GSM has been attached to a virtual console, and gsmld_write()
calls con_write() while holding a spinlock, and con_write() then tries
to get the console lock.</Note>
    </Notes>
    <CVE>CVE-2024-40966</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-40966.html</URL>
        <Description>CVE-2024-40966</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227886</URL>
        <Description>SUSE Bug 1227886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="141">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

serial: imx: Introduce timeout when waiting on transmitter empty

By waiting at most 1 second for USR2_TXDC to be set, we avoid a potential
deadlock.

In case of the timeout, there is not much we can do, so we simply ignore
the transmitter state and optimistically try to continue.</Note>
    </Notes>
    <CVE>CVE-2024-40967</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-40967.html</URL>
        <Description>CVE-2024-40967</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227891</URL>
        <Description>SUSE Bug 1227891</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="142">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: qedi: Fix crash while reading debugfs attribute

The qedi_dbg_do_not_recover_cmd_read() function invokes sprintf() directly
on a __user pointer, which results into the crash.

To fix this issue, use a small local stack buffer for sprintf() and then
call simple_read_from_buffer(), which in turns make the copy_to_user()
call.

BUG: unable to handle page fault for address: 00007f4801111000
PGD 8000000864df6067 P4D 8000000864df6067 PUD 864df7067 PMD 846028067 PTE 0
Oops: 0002 [#1] PREEMPT SMP PTI
Hardware name: HPE ProLiant DL380 Gen10/ProLiant DL380 Gen10, BIOS U30 06/15/2023
RIP: 0010:memcpy_orig+0xcd/0x130
RSP: 0018:ffffb7a18c3ffc40 EFLAGS: 00010202
RAX: 00007f4801111000 RBX: 00007f4801111000 RCX: 000000000000000f
RDX: 000000000000000f RSI: ffffffffc0bfd7a0 RDI: 00007f4801111000
RBP: ffffffffc0bfd7a0 R08: 725f746f6e5f6f64 R09: 3d7265766f636572
R10: ffffb7a18c3ffd08 R11: 0000000000000000 R12: 00007f4881110fff
R13: 000000007fffffff R14: ffffb7a18c3ffca0 R15: ffffffffc0bfd7af
FS:  00007f480118a740(0000) GS:ffff98e38af00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f4801111000 CR3: 0000000864b8e001 CR4: 00000000007706e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 ? __die_body+0x1a/0x60
 ? page_fault_oops+0x183/0x510
 ? exc_page_fault+0x69/0x150
 ? asm_exc_page_fault+0x22/0x30
 ? memcpy_orig+0xcd/0x130
 vsnprintf+0x102/0x4c0
 sprintf+0x51/0x80
 qedi_dbg_do_not_recover_cmd_read+0x2f/0x50 [qedi 6bcfdeeecdea037da47069eca2ba717c84a77324]
 full_proxy_read+0x50/0x80
 vfs_read+0xa5/0x2e0
 ? folio_add_new_anon_rmap+0x44/0xa0
 ? set_pte_at+0x15/0x30
 ? do_pte_missing+0x426/0x7f0
 ksys_read+0xa5/0xe0
 do_syscall_64+0x58/0x80
 ? __count_memcg_events+0x46/0x90
 ? count_memcg_event_mm+0x3d/0x60
 ? handle_mm_fault+0x196/0x2f0
 ? do_user_addr_fault+0x267/0x890
 ? exc_page_fault+0x69/0x150
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7f4800f20b4d</Note>
    </Notes>
    <CVE>CVE-2024-40978</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-40978.html</URL>
        <Description>CVE-2024-40978</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227929</URL>
        <Description>SUSE Bug 1227929</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="143">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.</Note>
    </Notes>
    <CVE>CVE-2024-40982</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-40982.html</URL>
        <Description>CVE-2024-40982</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227865</URL>
        <Description>SUSE Bug 1227865</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="144">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix UBSAN warning in kv_dpm.c

Adds bounds check for sumo_vid_mapping_entry.</Note>
    </Notes>
    <CVE>CVE-2024-40987</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-40987.html</URL>
        <Description>CVE-2024-40987</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228235</URL>
        <Description>SUSE Bug 1228235</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="145">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: fix UBSAN warning in kv_dpm.c

Adds bounds check for sumo_vid_mapping_entry.</Note>
    </Notes>
    <CVE>CVE-2024-40988</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-40988.html</URL>
        <Description>CVE-2024-40988</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227957</URL>
        <Description>SUSE Bug 1227957</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="146">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/mlx5: Add check for srq max_sge attribute

max_sge attribute is passed by the user, and is inserted and used
unchecked, so verify that the value doesn't exceed maximum allowed value
before using it.</Note>
    </Notes>
    <CVE>CVE-2024-40990</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-40990.html</URL>
        <Description>CVE-2024-40990</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227824</URL>
        <Description>SUSE Bug 1227824</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="147">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()

syzbot found hanging tasks waiting on rtnl_lock [1]

A reproducer is available in the syzbot bug.

When a request to add multiple actions with the same index is sent, the
second request will block forever on the first request. This holds
rtnl_lock, and causes tasks to hang.

Return -EAGAIN to prevent infinite looping, while keeping documented
behavior.

[1]

INFO: task kworker/1:0:5088 blocked for more than 143 seconds.
Not tainted 6.9.0-rc4-syzkaller-00173-g3cdb45594619 #0
"echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:0 state:D stack:23744 pid:5088 tgid:5088 ppid:2 flags:0x00004000
Workqueue: events_power_efficient reg_check_chans_work
Call Trace:
&lt;TASK&gt;
context_switch kernel/sched/core.c:5409 [inline]
__schedule+0xf15/0x5d00 kernel/sched/core.c:6746
__schedule_loop kernel/sched/core.c:6823 [inline]
schedule+0xe7/0x350 kernel/sched/core.c:6838
schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6895
__mutex_lock_common kernel/locking/mutex.c:684 [inline]
__mutex_lock+0x5b8/0x9c0 kernel/locking/mutex.c:752
wiphy_lock include/net/cfg80211.h:5953 [inline]
reg_leave_invalid_chans net/wireless/reg.c:2466 [inline]
reg_check_chans_work+0x10a/0x10e0 net/wireless/reg.c:2481</Note>
    </Notes>
    <CVE>CVE-2024-40995</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-40995.html</URL>
        <Description>CVE-2024-40995</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227830</URL>
        <Description>SUSE Bug 1227830</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="148">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ext4: fix uninitialized ratelimit_state-&gt;lock access in __ext4_fill_super()

In the following concurrency we will access the uninitialized rs-&gt;lock:

ext4_fill_super
  ext4_register_sysfs
   // sysfs registered msg_ratelimit_interval_ms
                             // Other processes modify rs-&gt;interval to
                             // non-zero via msg_ratelimit_interval_ms
  ext4_orphan_cleanup
    ext4_msg(sb, KERN_INFO, "Errors on filesystem, "
      __ext4_msg
        ___ratelimit(&amp;(EXT4_SB(sb)-&gt;s_msg_ratelimit_state)
          if (!rs-&gt;interval)  // do nothing if interval is 0
            return 1;
          raw_spin_trylock_irqsave(&amp;rs-&gt;lock, flags)
            raw_spin_trylock(lock)
              _raw_spin_trylock
                __raw_spin_trylock
                  spin_acquire(&amp;lock-&gt;dep_map, 0, 1, _RET_IP_)
                    lock_acquire
                      __lock_acquire
                        register_lock_class
                          assign_lock_key
                            dump_stack();
  ratelimit_state_init(&amp;sbi-&gt;s_msg_ratelimit_state, 5 * HZ, 10);
    raw_spin_lock_init(&amp;rs-&gt;lock);
    // init rs-&gt;lock here

and get the following dump_stack:

=========================================================
INFO: trying to register non-static key.
The code is fine but needs lockdep annotation, or maybe
you didn't initialize this object before use?
turning off the locking correctness validator.
CPU: 12 PID: 753 Comm: mount Tainted: G E 6.7.0-rc6-next-20231222 #504
[...]
Call Trace:
 dump_stack_lvl+0xc5/0x170
 dump_stack+0x18/0x30
 register_lock_class+0x740/0x7c0
 __lock_acquire+0x69/0x13a0
 lock_acquire+0x120/0x450
 _raw_spin_trylock+0x98/0xd0
 ___ratelimit+0xf6/0x220
 __ext4_msg+0x7f/0x160 [ext4]
 ext4_orphan_cleanup+0x665/0x740 [ext4]
 __ext4_fill_super+0x21ea/0x2b10 [ext4]
 ext4_fill_super+0x14d/0x360 [ext4]
[...]
=========================================================

Normally interval is 0 until s_msg_ratelimit_state is initialized, so
___ratelimit() does nothing. But registering sysfs precedes initializing
rs-&gt;lock, so it is possible to change rs-&gt;interval to a non-zero value
via the msg_ratelimit_interval_ms interface of sysfs while rs-&gt;lock is
uninitialized, and then a call to ext4_msg triggers the problem by
accessing an uninitialized rs-&gt;lock. Therefore register sysfs after all
initializations are complete to avoid such problems.</Note>
    </Notes>
    <CVE>CVE-2024-40998</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-40998.html</URL>
        <Description>CVE-2024-40998</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227866</URL>
        <Description>SUSE Bug 1227866</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="149">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: ena: Add validation for completion descriptors consistency

Validate that `first` flag is set only for the first
descriptor in multi-buffer packets.
In case of an invalid descriptor, a reset will occur.
A new reset reason for RX data corruption has been added.</Note>
    </Notes>
    <CVE>CVE-2024-40999</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-40999.html</URL>
        <Description>CVE-2024-40999</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227913</URL>
        <Description>SUSE Bug 1227913</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="150">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

xfs: add bounds checking to xlog_recover_process_data

There is a lack of verification of the space occupied by fixed members
of xlog_op_header in the xlog_recover_process_data.

We can create a crafted image to trigger an out of bounds read by
following these steps:
    1) Mount an image of xfs, and do some file operations to leave records
    2) Before umounting, copy the image for subsequent steps to simulate
       abnormal exit. Because umount will ensure that tail_blk and
       head_blk are the same, which will result in the inability to enter
       xlog_recover_process_data
    3) Write a tool to parse and modify the copied image in step 2
    4) Make the end of the xlog_op_header entries only 1 byte away from
       xlog_rec_header-&gt;h_size
    5) xlog_rec_header-&gt;h_num_logops++
    6) Modify xlog_rec_header-&gt;h_crc

Fix:
Add a check to make sure there is sufficient space to access fixed members
of xlog_op_header.</Note>
    </Notes>
    <CVE>CVE-2024-41014</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-41014.html</URL>
        <Description>CVE-2024-41014</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228408</URL>
        <Description>SUSE Bug 1228408</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="151">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ocfs2: add bounds checking to ocfs2_check_dir_entry()

This adds sanity checks for ocfs2_dir_entry to make sure all members of
ocfs2_dir_entry don't stray beyond valid memory region.</Note>
    </Notes>
    <CVE>CVE-2024-41015</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-41015.html</URL>
        <Description>CVE-2024-41015</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228409</URL>
        <Description>SUSE Bug 1228409</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="152">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()

xattr in ocfs2 maybe 'non-indexed', which saved with additional space
requested.  It's better to check if the memory is out of bound before
memcmp, although this possibility mainly comes from crafted poisonous
images.</Note>
    </Notes>
    <CVE>CVE-2024-41016</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-41016.html</URL>
        <Description>CVE-2024-41016</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228410</URL>
        <Description>SUSE Bug 1228410</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="153">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ppp: reject claimed-as-LCP but actually malformed packets

Since 'ppp_async_encode()' assumes valid LCP packets (with code
from 1 to 7 inclusive), add 'ppp_check_packet()' to ensure that
LCP packet has an actual body beyond PPP_LCP header bytes, and
reject claimed-as-LCP but actually malformed data otherwise.</Note>
    </Notes>
    <CVE>CVE-2024-41044</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-41044.html</URL>
        <Description>CVE-2024-41044</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228530</URL>
        <Description>SUSE Bug 1228530</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="154">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

skmsg: Skip zero length skb in sk_msg_recvmsg

When running BPF selftests (./test_progs -t sockmap_basic) on a Loongarch
platform, the following kernel panic occurs:

  [...]
  Oops[#1]:
  CPU: 22 PID: 2824 Comm: test_progs Tainted: G           OE  6.10.0-rc2+ #18
  Hardware name: LOONGSON Dabieshan/Loongson-TC542F0, BIOS Loongson-UDK2018
     ... ...
     ra: 90000000048bf6c0 sk_msg_recvmsg+0x120/0x560
    ERA: 9000000004162774 copy_page_to_iter+0x74/0x1c0
   CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)
   PRMD: 0000000c (PPLV0 +PIE +PWE)
   EUEN: 00000007 (+FPE +SXE +ASXE -BTE)
   ECFG: 00071c1d (LIE=0,2-4,10-12 VS=7)
  ESTAT: 00010000 [PIL] (IS= ECode=1 EsubCode=0)
   BADV: 0000000000000040
   PRID: 0014c011 (Loongson-64bit, Loongson-3C5000)
  Modules linked in: bpf_testmod(OE) xt_CHECKSUM xt_MASQUERADE xt_conntrack
  Process test_progs (pid: 2824, threadinfo=0000000000863a31, task=...)
  Stack : ...
  Call Trace:
  [&lt;9000000004162774&gt;] copy_page_to_iter+0x74/0x1c0
  [&lt;90000000048bf6c0&gt;] sk_msg_recvmsg+0x120/0x560
  [&lt;90000000049f2b90&gt;] tcp_bpf_recvmsg_parser+0x170/0x4e0
  [&lt;90000000049aae34&gt;] inet_recvmsg+0x54/0x100
  [&lt;900000000481ad5c&gt;] sock_recvmsg+0x7c/0xe0
  [&lt;900000000481e1a8&gt;] __sys_recvfrom+0x108/0x1c0
  [&lt;900000000481e27c&gt;] sys_recvfrom+0x1c/0x40
  [&lt;9000000004c076ec&gt;] do_syscall+0x8c/0xc0
  [&lt;9000000003731da4&gt;] handle_syscall+0xc4/0x160
  Code: ...
  ---[ end trace 0000000000000000 ]---
  Kernel panic - not syncing: Fatal exception
  Kernel relocated by 0x3510000
   .text @ 0x9000000003710000
   .data @ 0x9000000004d70000
   .bss  @ 0x9000000006469400
  ---[ end Kernel panic - not syncing: Fatal exception ]---
  [...]

This crash happens every time when running sockmap_skb_verdict_shutdown
subtest in sockmap_basic.

This crash is because a NULL pointer is passed to page_address() in the
sk_msg_recvmsg(). Due to the different implementations depending on the
architecture, page_address(NULL) will trigger a panic on Loongarch
platform but not on x86 platform. So this bug was hidden on x86 platform
for a while, but now it is exposed on Loongarch platform. The root cause
is that a zero length skb (skb-&gt;len == 0) was put on the queue.

This zero length skb is a TCP FIN packet, which was sent by shutdown(),
invoked in test_sockmap_skb_verdict_shutdown():

	shutdown(p1, SHUT_WR);

In this case, in sk_psock_skb_ingress_enqueue(), num_sge is zero, and no
page is put to this sge (see sg_set_page in sg_set_page), but this empty
sge is queued into ingress_msg list.

And in sk_msg_recvmsg(), this empty sge is used, and a NULL page is got by
sg_page(sge). Pass this NULL page to copy_page_to_iter(), which passes it
to kmap_local_page() and to page_address(), then kernel panics.

To solve this, we should skip this zero length skb. So in sk_msg_recvmsg(),
if copy is zero, that means it's a zero length skb, skip invoking
copy_page_to_iter(). We are using the EFAULT return triggered by
copy_page_to_iter to check for is_fin in tcp_bpf.c.</Note>
    </Notes>
    <CVE>CVE-2024-41048</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-41048.html</URL>
        <Description>CVE-2024-41048</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228565</URL>
        <Description>SUSE Bug 1228565</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="155">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

hfsplus: fix uninit-value in copy_name

[syzbot reported]
BUG: KMSAN: uninit-value in sized_strscpy+0xc4/0x160
 sized_strscpy+0xc4/0x160
 copy_name+0x2af/0x320 fs/hfsplus/xattr.c:411
 hfsplus_listxattr+0x11e9/0x1a50 fs/hfsplus/xattr.c:750
 vfs_listxattr fs/xattr.c:493 [inline]
 listxattr+0x1f3/0x6b0 fs/xattr.c:840
 path_listxattr fs/xattr.c:864 [inline]
 __do_sys_listxattr fs/xattr.c:876 [inline]
 __se_sys_listxattr fs/xattr.c:873 [inline]
 __x64_sys_listxattr+0x16b/0x2f0 fs/xattr.c:873
 x64_sys_call+0x2ba0/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:195
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Uninit was created at:
 slab_post_alloc_hook mm/slub.c:3877 [inline]
 slab_alloc_node mm/slub.c:3918 [inline]
 kmalloc_trace+0x57b/0xbe0 mm/slub.c:4065
 kmalloc include/linux/slab.h:628 [inline]
 hfsplus_listxattr+0x4cc/0x1a50 fs/hfsplus/xattr.c:699
 vfs_listxattr fs/xattr.c:493 [inline]
 listxattr+0x1f3/0x6b0 fs/xattr.c:840
 path_listxattr fs/xattr.c:864 [inline]
 __do_sys_listxattr fs/xattr.c:876 [inline]
 __se_sys_listxattr fs/xattr.c:873 [inline]
 __x64_sys_listxattr+0x16b/0x2f0 fs/xattr.c:873
 x64_sys_call+0x2ba0/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:195
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
[Fix]
When allocating memory to strbuf, initialize memory to 0.</Note>
    </Notes>
    <CVE>CVE-2024-41059</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-41059.html</URL>
        <Description>CVE-2024-41059</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228561</URL>
        <Description>SUSE Bug 1228561</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228573</URL>
        <Description>SUSE Bug 1228573</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="156">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: check bo_va-&gt;bo is non-NULL before using it

The call to radeon_vm_clear_freed might clear bo_va-&gt;bo, so
we have to check it before dereferencing it.</Note>
    </Notes>
    <CVE>CVE-2024-41060</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-41060.html</URL>
        <Description>CVE-2024-41060</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228567</URL>
        <Description>SUSE Bug 1228567</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="157">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_core: cancel all works upon hci_unregister_dev()

syzbot is reporting that calling hci_release_dev() from hci_error_reset()
due to hci_dev_put() from hci_error_reset() can cause deadlock at
destroy_workqueue(), for hci_error_reset() is called from
hdev-&gt;req_workqueue which destroy_workqueue() needs to flush.

We need to make sure that hdev-&gt;{rx_work,cmd_work,tx_work} which are
queued into hdev-&gt;workqueue and hdev-&gt;{power_on,error_reset} which are
queued into hdev-&gt;req_workqueue are no longer running by the moment

       destroy_workqueue(hdev-&gt;workqueue);
       destroy_workqueue(hdev-&gt;req_workqueue);

are called from hci_release_dev().

Call cancel_work_sync() on these work items from hci_unregister_dev()
as soon as hdev-&gt;list is removed from hci_dev_list.</Note>
    </Notes>
    <CVE>CVE-2024-41063</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-41063.html</URL>
        <Description>CVE-2024-41063</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228580</URL>
        <Description>SUSE Bug 1228580</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="158">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

powerpc/eeh: avoid possible crash when edev-&gt;pdev changes

If a PCI device is removed during eeh_pe_report_edev(), edev-&gt;pdev
will change and can cause a crash, hold the PCI rescan/remove lock
while taking a copy of edev-&gt;pdev-&gt;bus.</Note>
    </Notes>
    <CVE>CVE-2024-41064</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-41064.html</URL>
        <Description>CVE-2024-41064</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228599</URL>
        <Description>SUSE Bug 1228599</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="159">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ibmvnic: Add tx check to prevent skb leak

Below is a summary of how the driver stores a reference to an skb during
transmit:
    tx_buff[free_map[consumer_index]]-&gt;skb = new_skb;
    free_map[consumer_index] = IBMVNIC_INVALID_MAP;
    consumer_index ++;
Where variable data looks like this:
    free_map == [4, IBMVNIC_INVALID_MAP, IBMVNIC_INVALID_MAP, 0, 3]
                                               	consumer_index^
    tx_buff == [skb=null, skb=&lt;ptr&gt;, skb=&lt;ptr&gt;, skb=null, skb=null]

The driver has checks to ensure that free_map[consumer_index] pointed to
a valid index but there was no check to ensure that this index pointed
to an unused/null skb address. So, if, by some chance, our free_map and
tx_buff lists become out of sync then we were previously risking an
skb memory leak. This could then cause tcp congestion control to stop
sending packets, eventually leading to ETIMEDOUT.

Therefore, add a conditional to ensure that the skb address is null. If
not then warn the user (because this is still a bug that should be
patched) and free the old pointer to prevent memleak/tcp problems.</Note>
    </Notes>
    <CVE>CVE-2024-41066</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-41066.html</URL>
        <Description>CVE-2024-41066</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228640</URL>
        <Description>SUSE Bug 1228640</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="160">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group()

Al reported a possible use-after-free (UAF) in kvm_spapr_tce_attach_iommu_group().

It looks up `stt` from tablefd, but then continues to use it after doing
fdput() on the returned fd. After the fdput() the tablefd is free to be
closed by another thread. The close calls kvm_spapr_tce_release() and
then release_spapr_tce_table() (via call_rcu()) which frees `stt`.

Although there are calls to rcu_read_lock() in
kvm_spapr_tce_attach_iommu_group() they are not sufficient to prevent
the UAF, because `stt` is used outside the locked regions.

With an artifcial delay after the fdput() and a userspace program which
triggers the race, KASAN detects the UAF:

  BUG: KASAN: slab-use-after-free in kvm_spapr_tce_attach_iommu_group+0x298/0x720 [kvm]
  Read of size 4 at addr c000200027552c30 by task kvm-vfio/2505
  CPU: 54 PID: 2505 Comm: kvm-vfio Not tainted 6.10.0-rc3-next-20240612-dirty #1
  Hardware name: 8335-GTH POWER9 0x4e1202 opal:skiboot-v6.5.3-35-g1851b2a06 PowerNV
  Call Trace:
    dump_stack_lvl+0xb4/0x108 (unreliable)
    print_report+0x2b4/0x6ec
    kasan_report+0x118/0x2b0
    __asan_load4+0xb8/0xd0
    kvm_spapr_tce_attach_iommu_group+0x298/0x720 [kvm]
    kvm_vfio_set_attr+0x524/0xac0 [kvm]
    kvm_device_ioctl+0x144/0x240 [kvm]
    sys_ioctl+0x62c/0x1810
    system_call_exception+0x190/0x440
    system_call_vectored_common+0x15c/0x2ec
  ...
  Freed by task 0:
   ...
   kfree+0xec/0x3e0
   release_spapr_tce_table+0xd4/0x11c [kvm]
   rcu_core+0x568/0x16a0
   handle_softirqs+0x23c/0x920
   do_softirq_own_stack+0x6c/0x90
   do_softirq_own_stack+0x58/0x90
   __irq_exit_rcu+0x218/0x2d0
   irq_exit+0x30/0x80
   arch_local_irq_restore+0x128/0x230
   arch_local_irq_enable+0x1c/0x30
   cpuidle_enter_state+0x134/0x5cc
   cpuidle_enter+0x6c/0xb0
   call_cpuidle+0x7c/0x100
   do_idle+0x394/0x410
   cpu_startup_entry+0x60/0x70
   start_secondary+0x3fc/0x410
   start_secondary_prolog+0x10/0x14

Fix it by delaying the fdput() until `stt` is no longer in use, which
is effectively the entire function. To keep the patch minimal add a call
to fdput() at each of the existing return paths. Future work can convert
the function to goto or __cleanup style cleanup.

With the fix in place the test case no longer triggers the UAF.</Note>
    </Notes>
    <CVE>CVE-2024-41070</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-41070.html</URL>
        <Description>CVE-2024-41070</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228581</URL>
        <Description>SUSE Bug 1228581</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="161">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.</Note>
    </Notes>
    <CVE>CVE-2024-41071</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-41071.html</URL>
        <Description>CVE-2024-41071</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228625</URL>
        <Description>SUSE Bug 1228625</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="162">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: wext: add extra SIOCSIWSCAN data check

In 'cfg80211_wext_siwscan()', add extra check whether number of
channels passed via 'ioctl(sock, SIOCSIWSCAN, ...)' doesn't exceed
IW_MAX_FREQUENCIES and reject invalid request with -EINVAL otherwise.</Note>
    </Notes>
    <CVE>CVE-2024-41072</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-41072.html</URL>
        <Description>CVE-2024-41072</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228626</URL>
        <Description>SUSE Bug 1228626</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="163">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

NFSv4: Fix memory leak in nfs4_set_security_label

We leak nfs_fattr and nfs4_label every time we set a security xattr.</Note>
    </Notes>
    <CVE>CVE-2024-41076</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-41076.html</URL>
        <Description>CVE-2024-41076</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228649</URL>
        <Description>SUSE Bug 1228649</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="164">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

btrfs: qgroup: fix quota root leak after quota disable failure

If during the quota disable we fail when cleaning the quota tree or when
deleting the root from the root tree, we jump to the 'out' label without
ever dropping the reference on the quota root, resulting in a leak of the
root since fs_info-&gt;quota_root is no longer pointing to the root (we have
set it to NULL just before those steps).

Fix this by always doing a btrfs_put_root() call under the 'out' label.
This is a problem that exists since qgroups were first added in 2012 by
commit bed92eae26cc ("Btrfs: qgroup implementation and prototypes"), but
back then we missed a kfree on the quota root and free_extent_buffer()
calls on its root and commit root nodes, since back then roots were not
yet reference counted.</Note>
    </Notes>
    <CVE>CVE-2024-41078</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-41078.html</URL>
        <Description>CVE-2024-41078</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228655</URL>
        <Description>SUSE Bug 1228655</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="165">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ila: block BH in ila_output()

As explained in commit 1378817486d6 ("tipc: block BH
before using dst_cache"), net/core/dst_cache.c
helpers need to be called with BH disabled.

ila_output() is called from lwtunnel_output()
possibly from process context, and under rcu_read_lock().

We might be interrupted by a softirq, re-enter ila_output()
and corrupt dst_cache data structures.

Fix the race by using local_bh_disable().</Note>
    </Notes>
    <CVE>CVE-2024-41081</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-41081.html</URL>
        <Description>CVE-2024-41081</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228617</URL>
        <Description>SUSE Bug 1228617</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="166">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes

In nv17_tv_get_hd_modes(), the return value of drm_mode_duplicate() is
assigned to mode, which will lead to a possible NULL pointer dereference
on failure of drm_mode_duplicate(). The same applies to drm_cvt_mode().
Add a check to avoid null pointer dereference.</Note>
    </Notes>
    <CVE>CVE-2024-41089</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-41089.html</URL>
        <Description>CVE-2024-41089</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228658</URL>
        <Description>SUSE Bug 1228658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="167">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tap: add missing verification for short frame

The cited commit missed to check against the validity of the frame length
in the tap_get_user_xdp() path, which could cause a corrupted skb to be
sent downstack. Even before the skb is transmitted, the
tap_get_user_xdp()--&gt;skb_set_network_header() may assume the size is more
than ETH_HLEN. Once transmitted, this could either cause out-of-bound
access beyond the actual length, or confuse the underlayer with incorrect
or inconsistent header length in the skb metadata.

In the alternative path, tap_get_user() already prohibits short frame which
has the length less than Ethernet header size from being transmitted.

This is to drop any frame shorter than the Ethernet header size just like
how tap_get_user() does.

CVE: CVE-2024-41090</Note>
    </Notes>
    <CVE>CVE-2024-41090</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-41090.html</URL>
        <Description>CVE-2024-41090</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228328</URL>
        <Description>SUSE Bug 1228328</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228714</URL>
        <Description>SUSE Bug 1228714</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="168">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tun: add missing verification for short frame

The cited commit missed to check against the validity of the frame length
in the tun_xdp_one() path, which could cause a corrupted skb to be sent
downstack. Even before the skb is transmitted, the
tun_xdp_one--&gt;eth_type_trans() may access the Ethernet header although it
can be less than ETH_HLEN. Once transmitted, this could either cause
out-of-bound access beyond the actual length, or confuse the underlayer
with incorrect or inconsistent header length in the skb metadata.

In the alternative path, tun_get_user() already prohibits short frame which
has the length less than Ethernet header size from being transmitted for
IFF_TAP.

This is to drop any frame shorter than the Ethernet header size just like
how tun_get_user() does.

CVE: CVE-2024-41091</Note>
    </Notes>
    <CVE>CVE-2024-41091</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-41091.html</URL>
        <Description>CVE-2024-41091</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228327</URL>
        <Description>SUSE Bug 1228327</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="169">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes

In nv17_tv_get_ld_modes(), the return value of drm_mode_duplicate() is
assigned to mode, which will lead to a possible NULL pointer dereference
on failure of drm_mode_duplicate(). Add a check to avoid npd.</Note>
    </Notes>
    <CVE>CVE-2024-41095</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-41095.html</URL>
        <Description>CVE-2024-41095</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228662</URL>
        <Description>SUSE Bug 1228662</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="170">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers

register store validation for NFT_DATA_VALUE is conditional, however,
the datatype is always either NFT_DATA_VALUE or NFT_DATA_VERDICT. This
only requires a new helper function to infer the register type from the
set datatype so this conditional check can be removed. Otherwise,
pointer to chain object can be leaked through the registers.</Note>
    </Notes>
    <CVE>CVE-2024-42070</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-42070.html</URL>
        <Description>CVE-2024-42070</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228470</URL>
        <Description>SUSE Bug 1228470</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="171">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/dpaa2: Avoid explicit cpumask var allocation on stack

For CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask
variable on stack is not recommended since it can cause potential stack
overflow.

Instead, kernel code should always use *cpumask_var API(s) to allocate
cpumask var in config-neutral way, leaving allocation strategy to
CONFIG_CPUMASK_OFFSTACK.

Use *cpumask_var API(s) to address it.</Note>
    </Notes>
    <CVE>CVE-2024-42093</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-42093.html</URL>
        <Description>CVE-2024-42093</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228680</URL>
        <Description>SUSE Bug 1228680</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="172">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

x86: stop playing stack games in profile_pc()

The 'profile_pc()' function is used for timer-based profiling, which
isn't really all that relevant any more to begin with, but it also ends
up making assumptions based on the stack layout that aren't necessarily
valid.

Basically, the code tries to account the time spent in spinlocks to the
caller rather than the spinlock, and while I support that as a concept,
it's not worth the code complexity or the KASAN warnings when no serious
profiling is done using timers anyway these days.

And the code really does depend on stack layout that is only true in the
simplest of cases.  We've lost the comment at some point (I think when
the 32-bit and 64-bit code was unified), but it used to say:

	Assume the lock function has either no stack frame or a copy
	of eflags from PUSHF.

which explains why it just blindly loads a word or two straight off the
stack pointer and then takes a minimal look at the values to just check
if they might be eflags or the return pc:

	Eflags always has bits 22 and up cleared unlike kernel addresses

but that basic stack layout assumption assumes that there isn't any lock
debugging etc going on that would complicate the code and cause a stack
frame.

It causes KASAN unhappiness reported for years by syzkaller [1] and
others [2].

With no real practical reason for this any more, just remove the code.

Just for historical interest, here's some background commits relating to
this code from 2006:

  0cb91a229364 ("i386: Account spinlocks to the caller during profiling for !FP kernels")
  31679f38d886 ("Simplify profile_pc on x86-64")

and a code unification from 2009:

  ef4512882dbe ("x86: time_32/64.c unify profile_pc")

but the basics of this thing actually goes back to before the git tree.</Note>
    </Notes>
    <CVE>CVE-2024-42096</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-42096.html</URL>
        <Description>CVE-2024-42096</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228633</URL>
        <Description>SUSE Bug 1228633</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="173">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Skip finding free audio for unknown engine_id

[WHY]
ENGINE_ID_UNKNOWN = -1 and can not be used as an array index. Plus, it
also means it is uninitialized and does not need free audio.

[HOW]
Skip and return NULL.

This fixes 2 OVERRUN issues reported by Coverity.</Note>
    </Notes>
    <CVE>CVE-2024-42119</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-42119.html</URL>
        <Description>CVE-2024-42119</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228584</URL>
        <Description>SUSE Bug 1228584</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="174">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check pipe offset before setting vblank

pipe_ctx has a size of MAX_PIPES so checking its index before accessing
the array.

This fixes an OVERRUN issue reported by Coverity.</Note>
    </Notes>
    <CVE>CVE-2024-42120</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-42120.html</URL>
        <Description>CVE-2024-42120</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228588</URL>
        <Description>SUSE Bug 1228588</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="175">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: qedf: Make qedf_execute_tmf() non-preemptible

Stop calling smp_processor_id() from preemptible code in
qedf_execute_tmf90.  This results in BUG_ON() when running an RT kernel.

[ 659.343280] BUG: using smp_processor_id() in preemptible [00000000] code: sg_reset/3646
[ 659.343282] caller is qedf_execute_tmf+0x8b/0x360 [qedf]</Note>
    </Notes>
    <CVE>CVE-2024-42124</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-42124.html</URL>
        <Description>CVE-2024-42124</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228705</URL>
        <Description>SUSE Bug 1228705</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="176">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

IB/core: Implement a limit on UMAD receive List

The existing behavior of ib_umad, which maintains received MAD
packets in an unbounded list, poses a risk of uncontrolled growth.
As user-space applications extract packets from this list, the rate
of extraction may not match the rate of incoming packets, leading
to potential list overflow.

To address this, we introduce a limit to the size of the list. After
considering typical scenarios, such as OpenSM processing, which can
handle approximately 100k packets per second, and the 1-second retry
timeout for most packets, we set the list size limit to 200k. Packets
received beyond this limit are dropped, assuming they are likely timed
out by the time they are handled by user-space.

Notably, packets queued on the receive list due to reasons like
timed-out sends are preserved even when the list is full.</Note>
    </Notes>
    <CVE>CVE-2024-42145</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-42145.html</URL>
        <Description>CVE-2024-42145</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223384</URL>
        <Description>SUSE Bug 1223384</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228743</URL>
        <Description>SUSE Bug 1228743</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228744</URL>
        <Description>SUSE Bug 1228744</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="177">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

media: dvb-frontends: tda10048: Fix integer overflow

state-&gt;xtal_hz can be up to 16M, so it can overflow a 32 bit integer
when multiplied by pll_mfactor.

Create a new 64 bit variable to hold the calculations.</Note>
    </Notes>
    <CVE>CVE-2024-42223</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-42223.html</URL>
        <Description>CVE-2024-42223</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228726</URL>
        <Description>SUSE Bug 1228726</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="178">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: dsa: mv88e6xxx: Correct check for empty list

Since commit a3c53be55c95 ("net: dsa: mv88e6xxx: Support multiple MDIO
busses") mv88e6xxx_default_mdio_bus() has checked that the
return value of list_first_entry() is non-NULL.

This appears to be intended to guard against the list chip-&gt;mdios being
empty.  However, it is not the correct check as the implementation of
list_first_entry is not designed to return NULL for empty lists.

Instead, use list_first_entry_or_null() which does return NULL if the
list is empty.

Flagged by Smatch.
Compile tested only.</Note>
    </Notes>
    <CVE>CVE-2024-42224</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.194.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.194.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-42224.html</URL>
        <Description>CVE-2024-42224</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228723</URL>
        <Description>SUSE Bug 1228723</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
