<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:3617-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-10-14T12:07:08Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-10-14T12:07:08Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-10-14T12:07:08Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-38538: net: bridge: xmit: make sure we have at least eth header len bytes (bsc#1226606).
- CVE-2024-40902: jfs: xattr: fix buffer overflow for invalid xattr (bsc#1227764).
- CVE-2024-42104: nilfs2: add missing check for inode numbers on directory entries  (bsc#1228654).
- CVE-2024-42148: Fix multiple UBSAN array-index-out-of-bounds (bsc#1228487).
- CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434).

The following non-security bugs were fixed:

- alarmtimer: Lock k_itimer during timer callback (bsc#1214298).
- alarmtimers: Add alarm_forward functionality (bsc#1214298).
- alarmtimers: Change alarmtimer functions to return alarmtimer_restart (bsc#1214298).
- alarmtimers: Push rearming peroidic timers down into alamrtimer (bsc#1214298).
- alarmtimers: Remove interval cap limit hack (bsc#1214298).
- kABI fix for alarmtimer_restart functionality (bsc#1214298).
- kABI fix update for alarm_forward (bsc#1214298).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2024-3617,SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2024-3617</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243617-1/</URL>
      <Description>Link for SUSE-SU-2024:3617-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2024-October/019595.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:3617-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1214298</URL>
      <Description>SUSE Bug 1214298</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226606</URL>
      <Description>SUSE Bug 1226606</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227764</URL>
      <Description>SUSE Bug 1227764</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228487</URL>
      <Description>SUSE Bug 1228487</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228654</URL>
      <Description>SUSE Bug 1228654</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230434</URL>
      <Description>SUSE Bug 1230434</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38538/</URL>
      <Description>SUSE CVE CVE-2024-38538 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-40902/</URL>
      <Description>SUSE CVE CVE-2024-40902 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-42104/</URL>
      <Description>SUSE CVE CVE-2024-42104 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-42148/</URL>
      <Description>SUSE CVE CVE-2024-42148 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-45021/</URL>
      <Description>SUSE CVE CVE-2024-45021 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE" CPE="cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4">SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-debug-3.0.101-108.165.1">kernel-debug-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-base-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-debug-base-3.0.101-108.165.1">kernel-debug-base-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-devel-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-debug-devel-3.0.101-108.165.1">kernel-debug-devel-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-extra-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-debug-extra-3.0.101-108.165.1">kernel-debug-extra-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-hmac-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-debug-hmac-3.0.101-108.165.1">kernel-debug-hmac-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-default-3.0.101-108.165.1">kernel-default-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-base-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-default-base-3.0.101-108.165.1">kernel-default-base-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-devel-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-default-devel-3.0.101-108.165.1">kernel-default-devel-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-extra-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-default-extra-3.0.101-108.165.1">kernel-default-extra-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-hmac-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-default-hmac-3.0.101-108.165.1">kernel-default-hmac-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-docs-3.0.101-108.165.1">kernel-docs-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-ec2-3.0.101-108.165.1">kernel-ec2-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-base-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-ec2-base-3.0.101-108.165.1">kernel-ec2-base-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-devel-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-ec2-devel-3.0.101-108.165.1">kernel-ec2-devel-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-extra-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-ec2-extra-3.0.101-108.165.1">kernel-ec2-extra-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-ec2-hmac-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-ec2-hmac-3.0.101-108.165.1">kernel-ec2-hmac-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-pae-3.0.101-108.165.1">kernel-pae-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-base-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-pae-base-3.0.101-108.165.1">kernel-pae-base-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-devel-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-pae-devel-3.0.101-108.165.1">kernel-pae-devel-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-extra-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-pae-extra-3.0.101-108.165.1">kernel-pae-extra-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-pae-hmac-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-pae-hmac-3.0.101-108.165.1">kernel-pae-hmac-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-source-3.0.101-108.165.1">kernel-source-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-vanilla-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-source-vanilla-3.0.101-108.165.1">kernel-source-vanilla-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-syms-3.0.101-108.165.1">kernel-syms-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-trace-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-trace-3.0.101-108.165.1">kernel-trace-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-trace-base-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-trace-base-3.0.101-108.165.1">kernel-trace-base-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-trace-devel-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-trace-devel-3.0.101-108.165.1">kernel-trace-devel-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-trace-extra-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-trace-extra-3.0.101-108.165.1">kernel-trace-extra-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-trace-hmac-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-trace-hmac-3.0.101-108.165.1">kernel-trace-hmac-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-vanilla-3.0.101-108.165.1">kernel-vanilla-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-base-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-vanilla-base-3.0.101-108.165.1">kernel-vanilla-base-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-devel-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-vanilla-devel-3.0.101-108.165.1">kernel-vanilla-devel-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-hmac-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-vanilla-hmac-3.0.101-108.165.1">kernel-vanilla-hmac-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-xen-3.0.101-108.165.1">kernel-xen-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-base-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-xen-base-3.0.101-108.165.1">kernel-xen-base-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-devel-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-xen-devel-3.0.101-108.165.1">kernel-xen-devel-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-extra-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-xen-extra-3.0.101-108.165.1">kernel-xen-extra-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-xen-hmac-3.0.101-108.165.1">
      <FullProductName ProductID="kernel-xen-hmac-3.0.101-108.165.1">kernel-xen-hmac-3.0.101-108.165.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-default-3.0.101-108.165.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.165.1">kernel-default-3.0.101-108.165.1 as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-3.0.101-108.165.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.165.1">kernel-default-base-3.0.101-108.165.1 as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-3.0.101-108.165.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.165.1">kernel-default-devel-3.0.101-108.165.1 as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-3.0.101-108.165.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.165.1">kernel-ec2-3.0.101-108.165.1 as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-base-3.0.101-108.165.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.165.1">kernel-ec2-base-3.0.101-108.165.1 as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-ec2-devel-3.0.101-108.165.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.165.1">kernel-ec2-devel-3.0.101-108.165.1 as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-3.0.101-108.165.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.165.1">kernel-source-3.0.101-108.165.1 as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-3.0.101-108.165.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.165.1">kernel-syms-3.0.101-108.165.1 as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-trace-3.0.101-108.165.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.165.1">kernel-trace-3.0.101-108.165.1 as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-trace-base-3.0.101-108.165.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.165.1">kernel-trace-base-3.0.101-108.165.1 as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-trace-devel-3.0.101-108.165.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.165.1">kernel-trace-devel-3.0.101-108.165.1 as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-3.0.101-108.165.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.165.1">kernel-xen-3.0.101-108.165.1 as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-base-3.0.101-108.165.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.165.1">kernel-xen-base-3.0.101-108.165.1 as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-xen-devel-3.0.101-108.165.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.165.1">kernel-xen-devel-3.0.101-108.165.1 as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: bridge: xmit: make sure we have at least eth header len bytes

syzbot triggered an uninit value[1] error in bridge device's xmit path
by sending a short (less than ETH_HLEN bytes) skb. To fix it check if
we can actually pull that amount instead of assuming.

Tested with dropwatch:
 drop at: br_dev_xmit+0xb93/0x12d0 [bridge] (0xffffffffc06739b3)
 origin: software
 timestamp: Mon May 13 11:31:53 2024 778214037 nsec
 protocol: 0x88a8
 length: 2
 original length: 2
 drop reason: PKT_TOO_SMALL

[1]
BUG: KMSAN: uninit-value in br_dev_xmit+0x61d/0x1cb0 net/bridge/br_device.c:65
 br_dev_xmit+0x61d/0x1cb0 net/bridge/br_device.c:65
 __netdev_start_xmit include/linux/netdevice.h:4903 [inline]
 netdev_start_xmit include/linux/netdevice.h:4917 [inline]
 xmit_one net/core/dev.c:3531 [inline]
 dev_hard_start_xmit+0x247/0xa20 net/core/dev.c:3547
 __dev_queue_xmit+0x34db/0x5350 net/core/dev.c:4341
 dev_queue_xmit include/linux/netdevice.h:3091 [inline]
 __bpf_tx_skb net/core/filter.c:2136 [inline]
 __bpf_redirect_common net/core/filter.c:2180 [inline]
 __bpf_redirect+0x14a6/0x1620 net/core/filter.c:2187
 ____bpf_clone_redirect net/core/filter.c:2460 [inline]
 bpf_clone_redirect+0x328/0x470 net/core/filter.c:2432
 ___bpf_prog_run+0x13fe/0xe0f0 kernel/bpf/core.c:1997
 __bpf_prog_run512+0xb5/0xe0 kernel/bpf/core.c:2238
 bpf_dispatcher_nop_func include/linux/bpf.h:1234 [inline]
 __bpf_prog_run include/linux/filter.h:657 [inline]
 bpf_prog_run include/linux/filter.h:664 [inline]
 bpf_test_run+0x499/0xc30 net/bpf/test_run.c:425
 bpf_prog_test_run_skb+0x14ea/0x1f20 net/bpf/test_run.c:1058
 bpf_prog_test_run+0x6b7/0xad0 kernel/bpf/syscall.c:4269
 __sys_bpf+0x6aa/0xd90 kernel/bpf/syscall.c:5678
 __do_sys_bpf kernel/bpf/syscall.c:5767 [inline]
 __se_sys_bpf kernel/bpf/syscall.c:5765 [inline]
 __x64_sys_bpf+0xa0/0xe0 kernel/bpf/syscall.c:5765
 x64_sys_call+0x96b/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:322
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f</Note>
    </Notes>
    <CVE>CVE-2024-38538</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.165.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243617-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38538.html</URL>
        <Description>CVE-2024-38538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226606</URL>
        <Description>SUSE Bug 1226606</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

jfs: xattr: fix buffer overflow for invalid xattr

When an xattr size is not what is expected, it is printed out to the
kernel log in hex format as a form of debugging.  But when that xattr
size is bigger than the expected size, printing it out can cause an
access off the end of the buffer.

Fix this all up by properly restricting the size of the debug hex dump
in the kernel log.</Note>
    </Notes>
    <CVE>CVE-2024-40902</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.165.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243617-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-40902.html</URL>
        <Description>CVE-2024-40902</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227764</URL>
        <Description>SUSE Bug 1227764</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nilfs2: add missing check for inode numbers on directory entries

Syzbot reported that mounting and unmounting a specific pattern of
corrupted nilfs2 filesystem images causes a use-after-free of metadata
file inodes, which triggers a kernel bug in lru_add_fn().

As Jan Kara pointed out, this is because the link count of a metadata file
gets corrupted to 0, and nilfs_evict_inode(), which is called from iput(),
tries to delete that inode (ifile inode in this case).

The inconsistency occurs because directories containing the inode numbers
of these metadata files that should not be visible in the namespace are
read without checking.

Fix this issue by treating the inode numbers of these internal files as
errors in the sanity check helper when reading directory folios/pages.

Also thanks to Hillf Danton and Matthew Wilcox for their initial mm-layer
analysis.</Note>
    </Notes>
    <CVE>CVE-2024-42104</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.165.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243617-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-42104.html</URL>
        <Description>CVE-2024-42104</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228654</URL>
        <Description>SUSE Bug 1228654</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bnx2x: Fix multiple UBSAN array-index-out-of-bounds

Fix UBSAN warnings that occur when using a system with 32 physical
cpu cores or more, or when the user defines a number of Ethernet
queues greater than or equal to FP_SB_MAX_E1x using the num_queues
module parameter.

Currently there is a read/write out of bounds that occurs on the array
"struct stats_query_entry query" present inside the "bnx2x_fw_stats_req"
struct in "drivers/net/ethernet/broadcom/bnx2x/bnx2x.h".
Looking at the definition of the "struct stats_query_entry query" array:

struct stats_query_entry query[FP_SB_MAX_E1x+
         BNX2X_FIRST_QUEUE_QUERY_IDX];

FP_SB_MAX_E1x is defined as the maximum number of fast path interrupts and
has a value of 16, while BNX2X_FIRST_QUEUE_QUERY_IDX has a value of 3
meaning the array has a total size of 19.
Since accesses to "struct stats_query_entry query" are offset-ted by
BNX2X_FIRST_QUEUE_QUERY_IDX, that means that the total number of Ethernet
queues should not exceed FP_SB_MAX_E1x (16). However one of these queues
is reserved for FCOE and thus the number of Ethernet queues should be set
to [FP_SB_MAX_E1x -1] (15) if FCOE is enabled or [FP_SB_MAX_E1x] (16) if
it is not.

This is also described in a comment in the source code in
drivers/net/ethernet/broadcom/bnx2x/bnx2x.h just above the Macro definition
of FP_SB_MAX_E1x. Below is the part of this explanation that it important
for this patch

/*
  * The total number of L2 queues, MSIX vectors and HW contexts (CIDs) is
  * control by the number of fast-path status blocks supported by the
  * device (HW/FW). Each fast-path status block (FP-SB) aka non-default
  * status block represents an independent interrupts context that can
  * serve a regular L2 networking queue. However special L2 queues such
  * as the FCoE queue do not require a FP-SB and other components like
  * the CNIC may consume FP-SB reducing the number of possible L2 queues
  *
  * If the maximum number of FP-SB available is X then:
  * a. If CNIC is supported it consumes 1 FP-SB thus the max number of
  *    regular L2 queues is Y=X-1
  * b. In MF mode the actual number of L2 queues is Y= (X-1/MF_factor)
  * c. If the FCoE L2 queue is supported the actual number of L2 queues
  *    is Y+1
  * d. The number of irqs (MSIX vectors) is either Y+1 (one extra for
  *    slow-path interrupts) or Y+2 if CNIC is supported (one additional
  *    FP interrupt context for the CNIC).
  * e. The number of HW context (CID count) is always X or X+1 if FCoE
  *    L2 queue is supported. The cid for the FCoE L2 queue is always X.
  */

However this driver also supports NICs that use the E2 controller which can
handle more queues due to having more FP-SB represented by FP_SB_MAX_E2.
Looking at the commits when the E2 support was added, it was originally
using the E1x parameters: commit f2e0899f0f27 ("bnx2x: Add 57712 support").
Back then FP_SB_MAX_E2 was set to 16 the same as E1x. However the driver
was later updated to take full advantage of the E2 instead of having it be
limited to the capabilities of the E1x. But as far as we can tell, the
array "stats_query_entry query" was still limited to using the FP-SB
available to the E1x cards as part of an oversignt when the driver was
updated to take full advantage of the E2, and now with the driver being
aware of the greater queue size supported by E2 NICs, it causes the UBSAN
warnings seen in the stack traces below.

This patch increases the size of the "stats_query_entry query" array by
replacing FP_SB_MAX_E1x with FP_SB_MAX_E2 to be large enough to handle
both types of NICs.

Stack traces:

UBSAN: array-index-out-of-bounds in
       drivers/net/ethernet/broadcom/bnx2x/bnx2x_stats.c:1529:11
index 20 is out of range for type 'stats_query_entry [19]'
CPU: 12 PID: 858 Comm: systemd-network Not tainted 6.9.0-060900rc7-generic
	     #202405052133
Hardware name: HP ProLiant DL360 Gen9/ProLiant DL360 
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-42148</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.165.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243617-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-42148.html</URL>
        <Description>CVE-2024-42148</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228487</URL>
        <Description>SUSE Bug 1228487</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

memcg_write_event_control(): fix a user-triggerable oops

we are *not* guaranteed that anything past the terminating NUL
is mapped (let alone initialized with anything sane).</Note>
    </Notes>
    <CVE>CVE-2024-45021</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.165.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.165.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243617-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-45021.html</URL>
        <Description>CVE-2024-45021</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230434</URL>
        <Description>SUSE Bug 1230434</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
