<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:4100-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-11-28T12:42:12Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-11-28T12:42:12Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-11-28T12:42:12Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.

The Linux Enterprise 12 SP5 kernel turned LTSS (Extended Security)

The following security bugs were fixed:

- CVE-2021-46936: Fixed use-after-free in tw_timer_handler() (bsc#1220439).
- CVE-2021-47163: kABI fix for tipc: wait and exit until all work queues are done (bsc#1221980).
- CVE-2021-47612: nfc: fix segfault in nfc_genl_dump_devices_done (bsc#1226585).
- CVE-2022-48809: net: fix a memleak when uncloning an skb dst and its metadata (bsc#1227947).
- CVE-2022-48951: ASoC: ops: Correct bounds check for second channel on SX controls (bsc#1231929).
- CVE-2022-48956: ipv6: avoid use-after-free in ip6_fragment() (bsc#1231893).
- CVE-2022-48958: ethernet: aeroflex: fix potential skb leak in greth_init_rings() (bsc#1231889).
- CVE-2022-48960: net: hisilicon: Fix potential use-after-free in hix5hd2_rx() (bsc#1231979).
- CVE-2022-48962: net: hisilicon: Fix potential use-after-free in hisi_femac_rx() (bsc#1232286).
- CVE-2022-48966: net: mvneta: Fix an out of bounds check (bsc#1232191).
- CVE-2022-48967: NFC: nci: Bounds check struct nfc_target arrays (bsc#1232304).
- CVE-2022-48971: Bluetooth: Fix not cleanup led when bt_init fails (bsc#1232037).
- CVE-2022-48972: mac802154: fix missing INIT_LIST_HEAD in ieee802154_if_add() (bsc#1232025).
- CVE-2022-48973: gpio: amd8111: Fix PCI device reference count leak (bsc#1232039).
- CVE-2022-48978: HID: core: fix shift-out-of-bounds in hid_report_raw_event (bsc#1232038).
- CVE-2022-48991: mm/khugepaged: invoke MMU notifiers in shmem/file collapse paths (bsc#1232070).
- CVE-2022-48992: ASoC: soc-pcm: Add NULL check in BE reparenting (bsc#1232071).
- CVE-2022-49000: iommu/vt-d: Fix PCI device refcount leak in has_external_pci() (bsc#1232123).
- CVE-2022-49002: iommu/vt-d: Fix PCI device refcount leak in dmar_dev_scope_init() (bsc#1232133).
- CVE-2022-49010: hwmon: (coretemp) Check for null before removing sysfs attrs (bsc#1232172).
- CVE-2022-49011: hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() (bsc#1232006).
- CVE-2022-49014: net: tun: Fix use-after-free in tun_detach() (bsc#1231890).
- CVE-2022-49015: net: hsr: Fix potential use-after-free (bsc#1231938).
- CVE-2022-49020: net/9p: Fix a potential socket leak in p9_socket_open (bsc#1232175).
- CVE-2022-49021: net: phy: fix null-ptr-deref while probe() failed (bsc#1231939).
- CVE-2022-49026: e100: Fix possible use after free in e100_xmit_prepare (bsc#1231997).
- CVE-2022-49027: iavf: Fix error handling in iavf_init_module() (bsc#1232007).
- CVE-2022-49028: ixgbevf: Fix resource leak in ixgbevf_init_module() (bsc#1231996).
- CVE-2022-49029: hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails (bsc#1231995).
- CVE-2023-52898: xhci: Fix null pointer dereference when host dies (bsc#1229568).
- CVE-2023-52918: media: pci: cx23885: check cx23885_vdev_init() return (bsc#1232047).
- CVE-2024-26804: net: ip_tunnel: prevent perpetual headroom growth (bsc#1222629).
- CVE-2024-38538: net: bridge: xmit: make sure we have at least eth header len bytes (bsc#1226606).
- CVE-2024-39476: md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING (bsc#1227437).
- CVE-2024-40965: i2c: lpi2c: Avoid calling clk_get_rate during transfer (bsc#1227885).
- CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command  (bsc#1228620).
- CVE-2024-42114: netlink: extend policy range validation (bsc#1228564 prerequisite).
- CVE-2024-42253: gpio: pca953x: fix pca953x_irq_bus_sync_unlock race (bsc#1229005 stable-fixes).
- CVE-2024-44931: gpio: prevent potential speculation leaks in gpio_device_get_desc() (bsc#1229837 stable-fixes).
- CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc (bsc#1230179).
- CVE-2024-46724: drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number (bsc#1230725).
- CVE-2024-46755: wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id() (bsc#1230802).
- CVE-2024-46802: drm/amd/display: added NULL check at start of dc_validate_stream (bsc#1231111).
- CVE-2024-46809: drm/amd/display: Check BIOS images before it is used (bsc#1231148).
- CVE-2024-46813: drm/amd/display: Check link_index before accessing dc-&gt;links (bsc#1231191).
- CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links (bsc#1231197).
- CVE-2024-46818: drm/amd/display: Check gpio_id before used as array index (bsc#1231203).
- CVE-2024-46826: ELF: fix kernel.randomize_va_space double read (bsc#1231115).
- CVE-2024-46834: ethtool: fail closed if we can't get max channel used in indirection tables (bsc#1231096).
- CVE-2024-46840: btrfs: clean up our handling of refs == 0 in snapshot delete (bsc#1231105).
- CVE-2024-46841: btrfs: do not BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc() (bsc#1231094).
- CVE-2024-46848: perf/x86/intel: Limit the period on Haswell (bsc#1231072).
- CVE-2024-47672: wifi: iwlwifi: mvm: do not wait for tx queues if firmware is dead (bsc#1231540).
- CVE-2024-47673: wifi: iwlwifi: mvm: pause TCM when the firmware is stopped (bsc#1231539).
- CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case (bsc#1231673).
- CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231987).
- CVE-2024-47685: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() (bsc#1231998).
- CVE-2024-47697: drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error (bsc#1231858).
- CVE-2024-47698: drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error (bsc#1231859).
- CVE-2024-47706: block, bfq: fix possible UAF for bfqq-&gt;bic with merge chain (bsc#1231942).
- CVE-2024-47707: ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev() (bsc#1231935).
- CVE-2024-47713: wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop() (bsc#1232016).
- CVE-2024-47735: RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled (bsc#1232111).
- CVE-2024-47737: nfsd: call cache_put if xdr_reserve_space returns NULL (bsc#1232056).
- CVE-2024-47742: firmware_loader: Block path traversal (bsc#1232126).
- CVE-2024-47745: mm: split critical region in remap_file_pages() and invoke LSMs in between (bsc#1232135).
- CVE-2024-49851: tpm: Clean up TPM space after command failure (bsc#1232134).
- CVE-2024-49860: ACPI: sysfs: validate return type of _STR method (bsc#1231861).
- CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201).
- CVE-2024-49882: ext4: fix double brelse() the buffer of the extents path (bsc#1232200).
- CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent() (bsc#1232199).
- CVE-2024-49890: drm/amd/pm: ensure the fw_info is not null before using it (bsc#1232217).
- CVE-2024-49891: scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths (bsc#1232218).
- CVE-2024-49894: drm/amd/display: Fix index out of bounds in degamma hardware format translation (bsc#1232354).
- CVE-2024-49896: drm/amd/display: Check stream before comparing them (bsc#1232221).
- CVE-2024-49901: drm/msm/adreno: Assign msm_gpu-&gt;pdev earlier to avoid nullptrs (bsc#1232305).
- CVE-2024-49920: drm/amd/display: Check null pointers before multiple uses (bsc#1232313).
- CVE-2024-49929: wifi: iwlwifi: mvm: avoid NULL pointer dereference (bsc#1232253).
- CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash() (bsc#1232424).
- CVE-2024-49949: net: avoid potential underflow in qdisc_pkt_len_init() with UFO (bsc#1232160).
- CVE-2024-49958: ocfs2: reserve space for inline xattr before attaching reflink tree (bsc#1232151).
- CVE-2024-49959: jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error (bsc#1232149).
- CVE-2024-49962: ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package() (bsc#1232314).
- CVE-2024-49966: ocfs2: cancel dqi_sync_work before freeing oinfo (bsc#1232141).
- CVE-2024-49967: ext4: no need to continue when the number of entries is 1 (bsc#1232140).
- CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer (bsc#1232282).
- CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432).
- CVE-2024-49996: cifs: Fix buffer overflow when parsing NFS reparse points (bsc#1232089).
- CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate() (bsc#1232442).
- CVE-2024-50007: ALSA: asihpi: Fix potential OOB array access (bsc#1232394).
- CVE-2024-50024: net: Fix an unsafe loop on the list (bsc#1231954).
- CVE-2024-50033: slip: make slhc_remember() more robust against malicious packets (bsc#1231914).
- CVE-2024-50035: ppp: fix ppp_async_encode() illegal access (bsc#1232392).
- CVE-2024-50045: netfilter: br_netfilter: fix panic with metadata_dst skb (bsc#1231903).
- CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418).
- CVE-2024-50058: serial: protect uart_port_dtr_rts() in uart_shutdown() too (bsc#1232285).

The following non-security bugs were fixed:

- arm64: esr: Define ESR_ELx_EC_* constants as UL (git-fixes)
- arm64: probes: Fix simulate_ldr*_literal() (git-fixes)
- arm64: probes: Fix uprobes for big-endian kernels (git-fixes)
- arm64: probes: Remove broken LDR (literal) uprobe support (git-fixes)
- bpf: Fix pointer-leak due to insufficient speculative store bypass mitigation (bsc#1231375).
- drbd: Add NULL check for net_conf to prevent dereference in state validation (git-fixes).
- drbd: Fix atomicity violation in drbd_uuid_set_bm() (git-fixes).
- ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201)
- kernel-binary: generate and install compile_commands.json (bsc#1228971)
- net: usb: usbnet: fix name regression (get-fixes).
- nfs: fix memory leak in error path of nfs4_do_reclaim (git-fixes).
- nfsd: fix delegation_blocked() to block correctly for at least 30 seconds (git-fixes).
- x86/kaslr: Expose and use the end of the physical memory address space (bsc#1230405).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Image SLES12-SP5-Azure-BYOS-2024-4100,Image SLES12-SP5-Azure-HPC-BYOS-2024-4100,Image SLES12-SP5-Azure-SAP-BYOS-2024-4100,Image SLES12-SP5-Azure-SAP-On-Demand-2024-4100,Image SLES12-SP5-EC2-BYOS-2024-4100,Image SLES12-SP5-EC2-ECS-On-Demand-2024-4100,Image SLES12-SP5-EC2-On-Demand-2024-4100,Image SLES12-SP5-EC2-SAP-BYOS-2024-4100,Image SLES12-SP5-EC2-SAP-On-Demand-2024-4100,Image SLES12-SP5-GCE-BYOS-2024-4100,Image SLES12-SP5-GCE-On-Demand-2024-4100,Image SLES12-SP5-GCE-SAP-BYOS-2024-4100,Image SLES12-SP5-GCE-SAP-On-Demand-2024-4100,Image SLES12-SP5-SAP-Azure-LI-BYOS-Production-2024-4100,Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production-2024-4100,SUSE-2024-4100,SUSE-SLE-HA-12-SP5-2024-4100,SUSE-SLE-Live-Patching-12-SP5-2024-4100,SUSE-SLE-SERVER-12-SP5-LTSS-2024-4100,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4100</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      <Description>Link for SUSE-SU-2024:4100-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:4100-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1082555</URL>
      <Description>SUSE Bug 1082555</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176081</URL>
      <Description>SUSE Bug 1176081</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1206344</URL>
      <Description>SUSE Bug 1206344</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213034</URL>
      <Description>SUSE Bug 1213034</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218562</URL>
      <Description>SUSE Bug 1218562</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1219125</URL>
      <Description>SUSE Bug 1219125</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1220439</URL>
      <Description>SUSE Bug 1220439</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221980</URL>
      <Description>SUSE Bug 1221980</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222629</URL>
      <Description>SUSE Bug 1222629</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223384</URL>
      <Description>SUSE Bug 1223384</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223824</URL>
      <Description>SUSE Bug 1223824</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225189</URL>
      <Description>SUSE Bug 1225189</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225336</URL>
      <Description>SUSE Bug 1225336</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225611</URL>
      <Description>SUSE Bug 1225611</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226585</URL>
      <Description>SUSE Bug 1226585</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226606</URL>
      <Description>SUSE Bug 1226606</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227437</URL>
      <Description>SUSE Bug 1227437</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227885</URL>
      <Description>SUSE Bug 1227885</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227941</URL>
      <Description>SUSE Bug 1227941</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227947</URL>
      <Description>SUSE Bug 1227947</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227952</URL>
      <Description>SUSE Bug 1227952</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228000</URL>
      <Description>SUSE Bug 1228000</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228410</URL>
      <Description>SUSE Bug 1228410</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228564</URL>
      <Description>SUSE Bug 1228564</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228620</URL>
      <Description>SUSE Bug 1228620</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228743</URL>
      <Description>SUSE Bug 1228743</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229005</URL>
      <Description>SUSE Bug 1229005</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229042</URL>
      <Description>SUSE Bug 1229042</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229154</URL>
      <Description>SUSE Bug 1229154</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229568</URL>
      <Description>SUSE Bug 1229568</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229769</URL>
      <Description>SUSE Bug 1229769</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229837</URL>
      <Description>SUSE Bug 1229837</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230179</URL>
      <Description>SUSE Bug 1230179</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230405</URL>
      <Description>SUSE Bug 1230405</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230725</URL>
      <Description>SUSE Bug 1230725</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230802</URL>
      <Description>SUSE Bug 1230802</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231072</URL>
      <Description>SUSE Bug 1231072</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231094</URL>
      <Description>SUSE Bug 1231094</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231096</URL>
      <Description>SUSE Bug 1231096</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231105</URL>
      <Description>SUSE Bug 1231105</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231111</URL>
      <Description>SUSE Bug 1231111</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231115</URL>
      <Description>SUSE Bug 1231115</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231148</URL>
      <Description>SUSE Bug 1231148</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231191</URL>
      <Description>SUSE Bug 1231191</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231197</URL>
      <Description>SUSE Bug 1231197</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231203</URL>
      <Description>SUSE Bug 1231203</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231293</URL>
      <Description>SUSE Bug 1231293</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231375</URL>
      <Description>SUSE Bug 1231375</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231537</URL>
      <Description>SUSE Bug 1231537</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231539</URL>
      <Description>SUSE Bug 1231539</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231540</URL>
      <Description>SUSE Bug 1231540</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231673</URL>
      <Description>SUSE Bug 1231673</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231858</URL>
      <Description>SUSE Bug 1231858</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231859</URL>
      <Description>SUSE Bug 1231859</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231861</URL>
      <Description>SUSE Bug 1231861</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231864</URL>
      <Description>SUSE Bug 1231864</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231888</URL>
      <Description>SUSE Bug 1231888</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231889</URL>
      <Description>SUSE Bug 1231889</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231890</URL>
      <Description>SUSE Bug 1231890</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231893</URL>
      <Description>SUSE Bug 1231893</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231897</URL>
      <Description>SUSE Bug 1231897</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231903</URL>
      <Description>SUSE Bug 1231903</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231914</URL>
      <Description>SUSE Bug 1231914</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231929</URL>
      <Description>SUSE Bug 1231929</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231935</URL>
      <Description>SUSE Bug 1231935</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231938</URL>
      <Description>SUSE Bug 1231938</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231939</URL>
      <Description>SUSE Bug 1231939</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231942</URL>
      <Description>SUSE Bug 1231942</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231954</URL>
      <Description>SUSE Bug 1231954</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231958</URL>
      <Description>SUSE Bug 1231958</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231979</URL>
      <Description>SUSE Bug 1231979</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231987</URL>
      <Description>SUSE Bug 1231987</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231988</URL>
      <Description>SUSE Bug 1231988</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231995</URL>
      <Description>SUSE Bug 1231995</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231996</URL>
      <Description>SUSE Bug 1231996</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231997</URL>
      <Description>SUSE Bug 1231997</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231998</URL>
      <Description>SUSE Bug 1231998</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232006</URL>
      <Description>SUSE Bug 1232006</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232007</URL>
      <Description>SUSE Bug 1232007</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232016</URL>
      <Description>SUSE Bug 1232016</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232025</URL>
      <Description>SUSE Bug 1232025</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232026</URL>
      <Description>SUSE Bug 1232026</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232035</URL>
      <Description>SUSE Bug 1232035</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232037</URL>
      <Description>SUSE Bug 1232037</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232038</URL>
      <Description>SUSE Bug 1232038</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232039</URL>
      <Description>SUSE Bug 1232039</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232047</URL>
      <Description>SUSE Bug 1232047</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232056</URL>
      <Description>SUSE Bug 1232056</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232069</URL>
      <Description>SUSE Bug 1232069</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232070</URL>
      <Description>SUSE Bug 1232070</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232071</URL>
      <Description>SUSE Bug 1232071</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232089</URL>
      <Description>SUSE Bug 1232089</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232097</URL>
      <Description>SUSE Bug 1232097</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232111</URL>
      <Description>SUSE Bug 1232111</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232123</URL>
      <Description>SUSE Bug 1232123</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232126</URL>
      <Description>SUSE Bug 1232126</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232133</URL>
      <Description>SUSE Bug 1232133</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232134</URL>
      <Description>SUSE Bug 1232134</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232135</URL>
      <Description>SUSE Bug 1232135</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232140</URL>
      <Description>SUSE Bug 1232140</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232141</URL>
      <Description>SUSE Bug 1232141</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232142</URL>
      <Description>SUSE Bug 1232142</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232149</URL>
      <Description>SUSE Bug 1232149</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232151</URL>
      <Description>SUSE Bug 1232151</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232152</URL>
      <Description>SUSE Bug 1232152</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232160</URL>
      <Description>SUSE Bug 1232160</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232172</URL>
      <Description>SUSE Bug 1232172</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232175</URL>
      <Description>SUSE Bug 1232175</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232180</URL>
      <Description>SUSE Bug 1232180</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232191</URL>
      <Description>SUSE Bug 1232191</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232199</URL>
      <Description>SUSE Bug 1232199</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232200</URL>
      <Description>SUSE Bug 1232200</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232201</URL>
      <Description>SUSE Bug 1232201</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232217</URL>
      <Description>SUSE Bug 1232217</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232218</URL>
      <Description>SUSE Bug 1232218</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232221</URL>
      <Description>SUSE Bug 1232221</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232236</URL>
      <Description>SUSE Bug 1232236</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232253</URL>
      <Description>SUSE Bug 1232253</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232282</URL>
      <Description>SUSE Bug 1232282</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232285</URL>
      <Description>SUSE Bug 1232285</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232286</URL>
      <Description>SUSE Bug 1232286</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232304</URL>
      <Description>SUSE Bug 1232304</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232305</URL>
      <Description>SUSE Bug 1232305</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232313</URL>
      <Description>SUSE Bug 1232313</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232314</URL>
      <Description>SUSE Bug 1232314</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232339</URL>
      <Description>SUSE Bug 1232339</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232354</URL>
      <Description>SUSE Bug 1232354</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232392</URL>
      <Description>SUSE Bug 1232392</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232394</URL>
      <Description>SUSE Bug 1232394</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232418</URL>
      <Description>SUSE Bug 1232418</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232424</URL>
      <Description>SUSE Bug 1232424</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232432</URL>
      <Description>SUSE Bug 1232432</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232442</URL>
      <Description>SUSE Bug 1232442</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-46936/</URL>
      <Description>SUSE CVE CVE-2021-46936 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47163/</URL>
      <Description>SUSE CVE CVE-2021-47163 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47416/</URL>
      <Description>SUSE CVE CVE-2021-47416 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47612/</URL>
      <Description>SUSE CVE CVE-2021-47612 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48788/</URL>
      <Description>SUSE CVE CVE-2022-48788 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48789/</URL>
      <Description>SUSE CVE CVE-2022-48789 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48790/</URL>
      <Description>SUSE CVE CVE-2022-48790 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48809/</URL>
      <Description>SUSE CVE CVE-2022-48809 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48946/</URL>
      <Description>SUSE CVE CVE-2022-48946 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48949/</URL>
      <Description>SUSE CVE CVE-2022-48949 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48951/</URL>
      <Description>SUSE CVE CVE-2022-48951 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48956/</URL>
      <Description>SUSE CVE CVE-2022-48956 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48958/</URL>
      <Description>SUSE CVE CVE-2022-48958 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48960/</URL>
      <Description>SUSE CVE CVE-2022-48960 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48962/</URL>
      <Description>SUSE CVE CVE-2022-48962 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48966/</URL>
      <Description>SUSE CVE CVE-2022-48966 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48967/</URL>
      <Description>SUSE CVE CVE-2022-48967 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48969/</URL>
      <Description>SUSE CVE CVE-2022-48969 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48971/</URL>
      <Description>SUSE CVE CVE-2022-48971 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48972/</URL>
      <Description>SUSE CVE CVE-2022-48972 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48973/</URL>
      <Description>SUSE CVE CVE-2022-48973 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48978/</URL>
      <Description>SUSE CVE CVE-2022-48978 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48985/</URL>
      <Description>SUSE CVE CVE-2022-48985 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48988/</URL>
      <Description>SUSE CVE CVE-2022-48988 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48991/</URL>
      <Description>SUSE CVE CVE-2022-48991 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48992/</URL>
      <Description>SUSE CVE CVE-2022-48992 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48997/</URL>
      <Description>SUSE CVE CVE-2022-48997 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-49000/</URL>
      <Description>SUSE CVE CVE-2022-49000 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-49002/</URL>
      <Description>SUSE CVE CVE-2022-49002 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-49010/</URL>
      <Description>SUSE CVE CVE-2022-49010 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-49011/</URL>
      <Description>SUSE CVE CVE-2022-49011 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-49014/</URL>
      <Description>SUSE CVE CVE-2022-49014 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-49015/</URL>
      <Description>SUSE CVE CVE-2022-49015 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-49020/</URL>
      <Description>SUSE CVE CVE-2022-49020 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-49021/</URL>
      <Description>SUSE CVE CVE-2022-49021 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-49026/</URL>
      <Description>SUSE CVE CVE-2022-49026 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-49027/</URL>
      <Description>SUSE CVE CVE-2022-49027 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-49028/</URL>
      <Description>SUSE CVE CVE-2022-49028 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-49029/</URL>
      <Description>SUSE CVE CVE-2022-49029 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-46343/</URL>
      <Description>SUSE CVE CVE-2023-46343 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52881/</URL>
      <Description>SUSE CVE CVE-2023-52881 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52898/</URL>
      <Description>SUSE CVE CVE-2023-52898 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52918/</URL>
      <Description>SUSE CVE CVE-2023-52918 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52919/</URL>
      <Description>SUSE CVE CVE-2023-52919 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-6270/</URL>
      <Description>SUSE CVE CVE-2023-6270 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26804/</URL>
      <Description>SUSE CVE CVE-2024-26804 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-27043/</URL>
      <Description>SUSE CVE CVE-2024-27043 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38538/</URL>
      <Description>SUSE CVE CVE-2024-38538 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-39476/</URL>
      <Description>SUSE CVE CVE-2024-39476 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-40965/</URL>
      <Description>SUSE CVE CVE-2024-40965 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-41016/</URL>
      <Description>SUSE CVE CVE-2024-41016 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-41082/</URL>
      <Description>SUSE CVE CVE-2024-41082 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-42114/</URL>
      <Description>SUSE CVE CVE-2024-42114 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-42145/</URL>
      <Description>SUSE CVE CVE-2024-42145 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-42253/</URL>
      <Description>SUSE CVE CVE-2024-42253 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-44931/</URL>
      <Description>SUSE CVE CVE-2024-44931 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-44958/</URL>
      <Description>SUSE CVE CVE-2024-44958 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46724/</URL>
      <Description>SUSE CVE CVE-2024-46724 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46755/</URL>
      <Description>SUSE CVE CVE-2024-46755 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46802/</URL>
      <Description>SUSE CVE CVE-2024-46802 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46809/</URL>
      <Description>SUSE CVE CVE-2024-46809 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46813/</URL>
      <Description>SUSE CVE CVE-2024-46813 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46816/</URL>
      <Description>SUSE CVE CVE-2024-46816 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46818/</URL>
      <Description>SUSE CVE CVE-2024-46818 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46826/</URL>
      <Description>SUSE CVE CVE-2024-46826 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46834/</URL>
      <Description>SUSE CVE CVE-2024-46834 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46840/</URL>
      <Description>SUSE CVE CVE-2024-46840 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46841/</URL>
      <Description>SUSE CVE CVE-2024-46841 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46848/</URL>
      <Description>SUSE CVE CVE-2024-46848 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47670/</URL>
      <Description>SUSE CVE CVE-2024-47670 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47672/</URL>
      <Description>SUSE CVE CVE-2024-47672 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47673/</URL>
      <Description>SUSE CVE CVE-2024-47673 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47674/</URL>
      <Description>SUSE CVE CVE-2024-47674 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47684/</URL>
      <Description>SUSE CVE CVE-2024-47684 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47685/</URL>
      <Description>SUSE CVE CVE-2024-47685 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47696/</URL>
      <Description>SUSE CVE CVE-2024-47696 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47697/</URL>
      <Description>SUSE CVE CVE-2024-47697 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47698/</URL>
      <Description>SUSE CVE CVE-2024-47698 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47706/</URL>
      <Description>SUSE CVE CVE-2024-47706 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47707/</URL>
      <Description>SUSE CVE CVE-2024-47707 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47713/</URL>
      <Description>SUSE CVE CVE-2024-47713 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47735/</URL>
      <Description>SUSE CVE CVE-2024-47735 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47737/</URL>
      <Description>SUSE CVE CVE-2024-47737 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47742/</URL>
      <Description>SUSE CVE CVE-2024-47742 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47745/</URL>
      <Description>SUSE CVE CVE-2024-47745 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47749/</URL>
      <Description>SUSE CVE CVE-2024-47749 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49851/</URL>
      <Description>SUSE CVE CVE-2024-49851 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49860/</URL>
      <Description>SUSE CVE CVE-2024-49860 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49877/</URL>
      <Description>SUSE CVE CVE-2024-49877 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49881/</URL>
      <Description>SUSE CVE CVE-2024-49881 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49882/</URL>
      <Description>SUSE CVE CVE-2024-49882 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49883/</URL>
      <Description>SUSE CVE CVE-2024-49883 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49890/</URL>
      <Description>SUSE CVE CVE-2024-49890 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49891/</URL>
      <Description>SUSE CVE CVE-2024-49891 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49894/</URL>
      <Description>SUSE CVE CVE-2024-49894 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49896/</URL>
      <Description>SUSE CVE CVE-2024-49896 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49901/</URL>
      <Description>SUSE CVE CVE-2024-49901 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49920/</URL>
      <Description>SUSE CVE CVE-2024-49920 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49929/</URL>
      <Description>SUSE CVE CVE-2024-49929 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49936/</URL>
      <Description>SUSE CVE CVE-2024-49936 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49949/</URL>
      <Description>SUSE CVE CVE-2024-49949 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49957/</URL>
      <Description>SUSE CVE CVE-2024-49957 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49958/</URL>
      <Description>SUSE CVE CVE-2024-49958 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49959/</URL>
      <Description>SUSE CVE CVE-2024-49959 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49962/</URL>
      <Description>SUSE CVE CVE-2024-49962 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49965/</URL>
      <Description>SUSE CVE CVE-2024-49965 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49966/</URL>
      <Description>SUSE CVE CVE-2024-49966 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49967/</URL>
      <Description>SUSE CVE CVE-2024-49967 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49982/</URL>
      <Description>SUSE CVE CVE-2024-49982 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49991/</URL>
      <Description>SUSE CVE CVE-2024-49991 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49995/</URL>
      <Description>SUSE CVE CVE-2024-49995 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49996/</URL>
      <Description>SUSE CVE CVE-2024-49996 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50006/</URL>
      <Description>SUSE CVE CVE-2024-50006 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50007/</URL>
      <Description>SUSE CVE CVE-2024-50007 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50024/</URL>
      <Description>SUSE CVE CVE-2024-50024 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50033/</URL>
      <Description>SUSE CVE CVE-2024-50033 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50035/</URL>
      <Description>SUSE CVE CVE-2024-50035 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50045/</URL>
      <Description>SUSE CVE CVE-2024-50045 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50047/</URL>
      <Description>SUSE CVE CVE-2024-50047 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50058/</URL>
      <Description>SUSE CVE CVE-2024-50058 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Image SLES12-SP5-Azure-BYOS">
      <Branch Type="Product Name" Name="Image SLES12-SP5-Azure-BYOS">
        <FullProductName ProductID="Image SLES12-SP5-Azure-BYOS">Image SLES12-SP5-Azure-BYOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-Azure-HPC-BYOS">
      <Branch Type="Product Name" Name="Image SLES12-SP5-Azure-HPC-BYOS">
        <FullProductName ProductID="Image SLES12-SP5-Azure-HPC-BYOS">Image SLES12-SP5-Azure-HPC-BYOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-Azure-SAP-BYOS">
      <Branch Type="Product Name" Name="Image SLES12-SP5-Azure-SAP-BYOS">
        <FullProductName ProductID="Image SLES12-SP5-Azure-SAP-BYOS">Image SLES12-SP5-Azure-SAP-BYOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-Azure-SAP-On-Demand">
      <Branch Type="Product Name" Name="Image SLES12-SP5-Azure-SAP-On-Demand">
        <FullProductName ProductID="Image SLES12-SP5-Azure-SAP-On-Demand">Image SLES12-SP5-Azure-SAP-On-Demand</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-EC2-BYOS">
      <Branch Type="Product Name" Name="Image SLES12-SP5-EC2-BYOS">
        <FullProductName ProductID="Image SLES12-SP5-EC2-BYOS">Image SLES12-SP5-EC2-BYOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-EC2-ECS-On-Demand">
      <Branch Type="Product Name" Name="Image SLES12-SP5-EC2-ECS-On-Demand">
        <FullProductName ProductID="Image SLES12-SP5-EC2-ECS-On-Demand">Image SLES12-SP5-EC2-ECS-On-Demand</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-EC2-On-Demand">
      <Branch Type="Product Name" Name="Image SLES12-SP5-EC2-On-Demand">
        <FullProductName ProductID="Image SLES12-SP5-EC2-On-Demand">Image SLES12-SP5-EC2-On-Demand</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-EC2-SAP-BYOS">
      <Branch Type="Product Name" Name="Image SLES12-SP5-EC2-SAP-BYOS">
        <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-BYOS">Image SLES12-SP5-EC2-SAP-BYOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-EC2-SAP-On-Demand">
      <Branch Type="Product Name" Name="Image SLES12-SP5-EC2-SAP-On-Demand">
        <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-On-Demand">Image SLES12-SP5-EC2-SAP-On-Demand</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-GCE-BYOS">
      <Branch Type="Product Name" Name="Image SLES12-SP5-GCE-BYOS">
        <FullProductName ProductID="Image SLES12-SP5-GCE-BYOS">Image SLES12-SP5-GCE-BYOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-GCE-On-Demand">
      <Branch Type="Product Name" Name="Image SLES12-SP5-GCE-On-Demand">
        <FullProductName ProductID="Image SLES12-SP5-GCE-On-Demand">Image SLES12-SP5-GCE-On-Demand</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-GCE-SAP-BYOS">
      <Branch Type="Product Name" Name="Image SLES12-SP5-GCE-SAP-BYOS">
        <FullProductName ProductID="Image SLES12-SP5-GCE-SAP-BYOS">Image SLES12-SP5-GCE-SAP-BYOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-GCE-SAP-On-Demand">
      <Branch Type="Product Name" Name="Image SLES12-SP5-GCE-SAP-On-Demand">
        <FullProductName ProductID="Image SLES12-SP5-GCE-SAP-On-Demand">Image SLES12-SP5-GCE-SAP-On-Demand</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">
      <Branch Type="Product Name" Name="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">
        <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">Image SLES12-SP5-SAP-Azure-LI-BYOS-Production</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">
      <Branch Type="Product Name" Name="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">
        <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Live Patching 12 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Live Patching 12 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12 SP5" CPE="cpe:/o:suse:sle-live-patching:12:sp5">SUSE Linux Enterprise Live Patching 12 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-4.12.14-122.234.1">
      <FullProductName ProductID="kernel-default-4.12.14-122.234.1">kernel-default-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cluster-md-kmp-default-4.12.14-122.234.1">
      <FullProductName ProductID="cluster-md-kmp-default-4.12.14-122.234.1">cluster-md-kmp-default-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dlm-kmp-default-4.12.14-122.234.1">
      <FullProductName ProductID="dlm-kmp-default-4.12.14-122.234.1">dlm-kmp-default-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gfs2-kmp-default-4.12.14-122.234.1">
      <FullProductName ProductID="gfs2-kmp-default-4.12.14-122.234.1">gfs2-kmp-default-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ocfs2-kmp-default-4.12.14-122.234.1">
      <FullProductName ProductID="ocfs2-kmp-default-4.12.14-122.234.1">ocfs2-kmp-default-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-4.12.14-122.234.1">
      <FullProductName ProductID="kernel-debug-4.12.14-122.234.1">kernel-debug-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-base-4.12.14-122.234.1">
      <FullProductName ProductID="kernel-debug-base-4.12.14-122.234.1">kernel-debug-base-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-devel-4.12.14-122.234.1">
      <FullProductName ProductID="kernel-debug-devel-4.12.14-122.234.1">kernel-debug-devel-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-kgraft-devel-4.12.14-122.234.1">
      <FullProductName ProductID="kernel-debug-kgraft-devel-4.12.14-122.234.1">kernel-debug-kgraft-devel-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-base-4.12.14-122.234.1">
      <FullProductName ProductID="kernel-default-base-4.12.14-122.234.1">kernel-default-base-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-devel-4.12.14-122.234.1">
      <FullProductName ProductID="kernel-default-devel-4.12.14-122.234.1">kernel-default-devel-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-extra-4.12.14-122.234.1">
      <FullProductName ProductID="kernel-default-extra-4.12.14-122.234.1">kernel-default-extra-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-kgraft-4.12.14-122.234.1">
      <FullProductName ProductID="kernel-default-kgraft-4.12.14-122.234.1">kernel-default-kgraft-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-kgraft-devel-4.12.14-122.234.1">
      <FullProductName ProductID="kernel-default-kgraft-devel-4.12.14-122.234.1">kernel-default-kgraft-devel-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-man-4.12.14-122.234.1">
      <FullProductName ProductID="kernel-default-man-4.12.14-122.234.1">kernel-default-man-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-4.12.14-122.234.1">
      <FullProductName ProductID="kernel-devel-4.12.14-122.234.1">kernel-devel-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-4.12.14-122.234.1">
      <FullProductName ProductID="kernel-docs-4.12.14-122.234.1">kernel-docs-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-html-4.12.14-122.234.1">
      <FullProductName ProductID="kernel-docs-html-4.12.14-122.234.1">kernel-docs-html-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-kvmsmall-4.12.14-122.234.1">
      <FullProductName ProductID="kernel-kvmsmall-4.12.14-122.234.1">kernel-kvmsmall-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-kvmsmall-base-4.12.14-122.234.1">
      <FullProductName ProductID="kernel-kvmsmall-base-4.12.14-122.234.1">kernel-kvmsmall-base-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-kvmsmall-devel-4.12.14-122.234.1">
      <FullProductName ProductID="kernel-kvmsmall-devel-4.12.14-122.234.1">kernel-kvmsmall-devel-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-kvmsmall-kgraft-devel-4.12.14-122.234.1">
      <FullProductName ProductID="kernel-kvmsmall-kgraft-devel-4.12.14-122.234.1">kernel-kvmsmall-kgraft-devel-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-macros-4.12.14-122.234.1">
      <FullProductName ProductID="kernel-macros-4.12.14-122.234.1">kernel-macros-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-build-4.12.14-122.234.1">
      <FullProductName ProductID="kernel-obs-build-4.12.14-122.234.1">kernel-obs-build-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-qa-4.12.14-122.234.1">
      <FullProductName ProductID="kernel-obs-qa-4.12.14-122.234.1">kernel-obs-qa-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-4.12.14-122.234.1">
      <FullProductName ProductID="kernel-source-4.12.14-122.234.1">kernel-source-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-vanilla-4.12.14-122.234.1">
      <FullProductName ProductID="kernel-source-vanilla-4.12.14-122.234.1">kernel-source-vanilla-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-4.12.14-122.234.1">
      <FullProductName ProductID="kernel-syms-4.12.14-122.234.1">kernel-syms-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-4.12.14-122.234.1">
      <FullProductName ProductID="kernel-vanilla-4.12.14-122.234.1">kernel-vanilla-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-base-4.12.14-122.234.1">
      <FullProductName ProductID="kernel-vanilla-base-4.12.14-122.234.1">kernel-vanilla-base-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-devel-4.12.14-122.234.1">
      <FullProductName ProductID="kernel-vanilla-devel-4.12.14-122.234.1">kernel-vanilla-devel-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-kgraft-devel-4.12.14-122.234.1">
      <FullProductName ProductID="kernel-vanilla-kgraft-devel-4.12.14-122.234.1">kernel-vanilla-kgraft-devel-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-zfcpdump-4.12.14-122.234.1">
      <FullProductName ProductID="kernel-zfcpdump-4.12.14-122.234.1">kernel-zfcpdump-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-zfcpdump-man-4.12.14-122.234.1">
      <FullProductName ProductID="kernel-zfcpdump-man-4.12.14-122.234.1">kernel-zfcpdump-man-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kgraft-patch-4_12_14-122_234-default-1-8.3.1">
      <FullProductName ProductID="kgraft-patch-4_12_14-122_234-default-1-8.3.1">kgraft-patch-4_12_14-122_234-default-1-8.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kselftests-kmp-default-4.12.14-122.234.1">
      <FullProductName ProductID="kselftests-kmp-default-4.12.14-122.234.1">kselftests-kmp-default-4.12.14-122.234.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1">kernel-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-Azure-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-HPC-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1">kernel-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-Azure-HPC-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1">cluster-md-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1">dlm-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1">gfs2-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1">kernel-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1">ocfs2-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1">cluster-md-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-Azure-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1">dlm-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-Azure-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1">gfs2-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-Azure-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1">kernel-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-Azure-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1">ocfs2-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-Azure-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1">kernel-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-EC2-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-ECS-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1">kernel-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-EC2-ECS-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1">kernel-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-EC2-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1">cluster-md-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-EC2-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1">dlm-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-EC2-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1">gfs2-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-EC2-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1">kernel-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-EC2-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1">ocfs2-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-EC2-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1">cluster-md-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1">dlm-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1">gfs2-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1">kernel-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1">ocfs2-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-GCE-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1">kernel-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-GCE-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-GCE-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1">kernel-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-GCE-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-GCE-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1">cluster-md-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-GCE-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1">dlm-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-GCE-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1">gfs2-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-GCE-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1">kernel-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-GCE-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1">ocfs2-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-GCE-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1">cluster-md-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-GCE-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1">dlm-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-GCE-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1">gfs2-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-GCE-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1">kernel-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-GCE-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1">ocfs2-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1">cluster-md-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1">dlm-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1">gfs2-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1">kernel-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1">ocfs2-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1">cluster-md-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1">dlm-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1">gfs2-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1">kernel-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-default-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1">ocfs2-kmp-default-4.12.14-122.234.1 as a component of Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-kgraft-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1">kernel-default-kgraft-4.12.14-122.234.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-kgraft-devel-4.12.14-122.234.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1">kernel-default-kgraft-devel-4.12.14-122.234.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kgraft-patch-4_12_14-122_234-default-1-8.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1">kgraft-patch-4_12_14-122_234-default-1-8.3.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: fix use-after-free in tw_timer_handler

A real world panic issue was found as follow in Linux 5.4.

    BUG: unable to handle page fault for address: ffffde49a863de28
    PGD 7e6fe62067 P4D 7e6fe62067 PUD 7e6fe63067 PMD f51e064067 PTE 0
    RIP: 0010:tw_timer_handler+0x20/0x40
    Call Trace:
     &lt;IRQ&gt;
     call_timer_fn+0x2b/0x120
     run_timer_softirq+0x1ef/0x450
     __do_softirq+0x10d/0x2b8
     irq_exit+0xc7/0xd0
     smp_apic_timer_interrupt+0x68/0x120
     apic_timer_interrupt+0xf/0x20

This issue was also reported since 2017 in the thread [1],
unfortunately, the issue was still can be reproduced after fixing
DCCP.

The ipv4_mib_exit_net is called before tcp_sk_exit_batch when a net
namespace is destroyed since tcp_sk_ops is registered befrore
ipv4_mib_ops, which means tcp_sk_ops is in the front of ipv4_mib_ops
in the list of pernet_list. There will be a use-after-free on
net-&gt;mib.net_statistics in tw_timer_handler after ipv4_mib_exit_net
if there are some inflight time-wait timers.

This bug is not introduced by commit f2bf415cfed7 ("mib: add net to
NET_ADD_STATS_BH") since the net_statistics is a global variable
instead of dynamic allocation and freeing. Actually, commit
61a7e26028b9 ("mib: put net statistics on struct net") introduces
the bug since it put net statistics on struct net and free it when
net namespace is destroyed.

Moving init_ipv4_mibs() to the front of tcp_init() to fix this bug
and replace pr_crit() with panic() since continuing is meaningless
when init_ipv4_mibs() fails.

[1] https://groups.google.com/g/syzkaller/c/p1tn-_Kc6l4/m/smuL_FMAAgAJ?pli=1</Note>
    </Notes>
    <CVE>CVE-2021-46936</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-46936.html</URL>
        <Description>CVE-2021-46936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1220439</URL>
        <Description>SUSE Bug 1220439</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tipc: wait and exit until all work queues are done

On some host, a crash could be triggered simply by repeating these
commands several times:

  # modprobe tipc
  # tipc bearer enable media udp name UDP1 localip 127.0.0.1
  # rmmod tipc

  [] BUG: unable to handle kernel paging request at ffffffffc096bb00
  [] Workqueue: events 0xffffffffc096bb00
  [] Call Trace:
  []  ? process_one_work+0x1a7/0x360
  []  ? worker_thread+0x30/0x390
  []  ? create_worker+0x1a0/0x1a0
  []  ? kthread+0x116/0x130
  []  ? kthread_flush_work_fn+0x10/0x10
  []  ? ret_from_fork+0x35/0x40

When removing the TIPC module, the UDP tunnel sock will be delayed to
release in a work queue as sock_release() can't be done in rtnl_lock().
If the work queue is schedule to run after the TIPC module is removed,
kernel will crash as the work queue function cleanup_beareri() code no
longer exists when trying to invoke it.

To fix it, this patch introduce a member wq_count in tipc_net to track
the numbers of work queues in schedule, and  wait and exit until all
work queues are done in tipc_exit_net().</Note>
    </Notes>
    <CVE>CVE-2021-47163</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47163.html</URL>
        <Description>CVE-2021-47163</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221980</URL>
        <Description>SUSE Bug 1221980</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

phy: mdio: fix memory leak

Syzbot reported memory leak in MDIO bus interface, the problem was in
wrong state logic.

MDIOBUS_ALLOCATED indicates 2 states:
	1. Bus is only allocated
	2. Bus allocated and __mdiobus_register() fails, but
	   device_register() was called

In case of device_register() has been called we should call put_device()
to correctly free the memory allocated for this device, but mdiobus_free()
calls just kfree(dev) in case of MDIOBUS_ALLOCATED state

To avoid this behaviour we need to set bus-&gt;state to MDIOBUS_UNREGISTERED
_before_ calling device_register(), because put_device() should be
called even in case of device_register() failure.</Note>
    </Notes>
    <CVE>CVE-2021-47416</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47416.html</URL>
        <Description>CVE-2021-47416</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225189</URL>
        <Description>SUSE Bug 1225189</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225336</URL>
        <Description>SUSE Bug 1225336</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nfc: fix segfault in nfc_genl_dump_devices_done

When kmalloc in nfc_genl_dump_devices() fails then
nfc_genl_dump_devices_done() segfaults as below

KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
CPU: 0 PID: 25 Comm: kworker/0:1 Not tainted 5.16.0-rc4-01180-g2a987e65025e-dirty #5
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-6.fc35 04/01/2014
Workqueue: events netlink_sock_destruct_work
RIP: 0010:klist_iter_exit+0x26/0x80
Call Trace:
&lt;TASK&gt;
class_dev_iter_exit+0x15/0x20
nfc_genl_dump_devices_done+0x3b/0x50
genl_lock_done+0x84/0xd0
netlink_sock_destruct+0x8f/0x270
__sk_destruct+0x64/0x3b0
sk_destruct+0xa8/0xd0
__sk_free+0x2e8/0x3d0
sk_free+0x51/0x90
netlink_sock_destruct_work+0x1c/0x20
process_one_work+0x411/0x710
worker_thread+0x6fd/0xa80</Note>
    </Notes>
    <CVE>CVE-2021-47612</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47612.html</URL>
        <Description>CVE-2021-47612</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226585</URL>
        <Description>SUSE Bug 1226585</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nvme-rdma: fix possible use-after-free in transport error_recovery work

While nvme_rdma_submit_async_event_work is checking the ctrl and queue
state before preparing the AER command and scheduling io_work, in order
to fully prevent a race where this check is not reliable the error
recovery work must flush async_event_work before continuing to destroy
the admin queue after setting the ctrl state to RESETTING such that
there is no race .submit_async_event and the error recovery handler
itself changing the ctrl state.</Note>
    </Notes>
    <CVE>CVE-2022-48788</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48788.html</URL>
        <Description>CVE-2022-48788</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227952</URL>
        <Description>SUSE Bug 1227952</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nvme-tcp: fix possible use-after-free in transport error_recovery work

While nvme_tcp_submit_async_event_work is checking the ctrl and queue
state before preparing the AER command and scheduling io_work, in order
to fully prevent a race where this check is not reliable the error
recovery work must flush async_event_work before continuing to destroy
the admin queue after setting the ctrl state to RESETTING such that
there is no race .submit_async_event and the error recovery handler
itself changing the ctrl state.</Note>
    </Notes>
    <CVE>CVE-2022-48789</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48789.html</URL>
        <Description>CVE-2022-48789</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228000</URL>
        <Description>SUSE Bug 1228000</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nvme: fix a possible use-after-free in controller reset during load

Unlike .queue_rq, in .submit_async_event drivers may not check the ctrl
readiness for AER submission. This may lead to a use-after-free
condition that was observed with nvme-tcp.

The race condition may happen in the following scenario:
1. driver executes its reset_ctrl_work
2. -&gt; nvme_stop_ctrl - flushes ctrl async_event_work
3. ctrl sends AEN which is received by the host, which in turn
   schedules AEN handling
4. teardown admin queue (which releases the queue socket)
5. AEN processed, submits another AER, calling the driver to submit
6. driver attempts to send the cmd
==&gt; use-after-free

In order to fix that, add ctrl state check to validate the ctrl
is actually able to accept the AER submission.

This addresses the above race in controller resets because the driver
during teardown should:
1. change ctrl state to RESETTING
2. flush async_event_work (as well as other async work elements)

So after 1,2, any other AER command will find the
ctrl state to be RESETTING and bail out without submitting the AER.</Note>
    </Notes>
    <CVE>CVE-2022-48790</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48790.html</URL>
        <Description>CVE-2022-48790</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227941</URL>
        <Description>SUSE Bug 1227941</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: fix a memleak when uncloning an skb dst and its metadata

When uncloning an skb dst and its associated metadata, a new
dst+metadata is allocated and later replaces the old one in the skb.
This is helpful to have a non-shared dst+metadata attached to a specific
skb.

The issue is the uncloned dst+metadata is initialized with a refcount of
1, which is increased to 2 before attaching it to the skb. When
tun_dst_unclone returns, the dst+metadata is only referenced from a
single place (the skb) while its refcount is 2. Its refcount will never
drop to 0 (when the skb is consumed), leading to a memory leak.

Fix this by removing the call to dst_hold in tun_dst_unclone, as the
dst+metadata refcount is already 1.</Note>
    </Notes>
    <CVE>CVE-2022-48809</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48809.html</URL>
        <Description>CVE-2022-48809</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227947</URL>
        <Description>SUSE Bug 1227947</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

udf: Fix preallocation discarding at indirect extent boundary

When preallocation extent is the first one in the extent block, the
code would corrupt extent tree header instead. Fix the problem and use
udf_delete_aext() for deleting extent to avoid some code duplication.</Note>
    </Notes>
    <CVE>CVE-2022-48946</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48946.html</URL>
        <Description>CVE-2022-48946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231888</URL>
        <Description>SUSE Bug 1231888</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

igb: Initialize mailbox message for VF reset

When a MAC address is not assigned to the VF, that portion of the message
sent to the VF is not set. The memory, however, is allocated from the
stack meaning that information may be leaked to the VM. Initialize the
message buffer to 0 so that no information is passed to the VM in this
case.</Note>
    </Notes>
    <CVE>CVE-2022-48949</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48949.html</URL>
        <Description>CVE-2022-48949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231897</URL>
        <Description>SUSE Bug 1231897</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ASoC: ops: Check bounds for second channel in snd_soc_put_volsw_sx()

The bounds checks in snd_soc_put_volsw_sx() are only being applied to the
first channel, meaning it is possible to write out of bounds values to the
second channel in stereo controls. Add appropriate checks.</Note>
    </Notes>
    <CVE>CVE-2022-48951</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48951.html</URL>
        <Description>CVE-2022-48951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231929</URL>
        <Description>SUSE Bug 1231929</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ipv6: avoid use-after-free in ip6_fragment()

Blamed commit claimed rcu_read_lock() was held by ip6_fragment() callers.

It seems to not be always true, at least for UDP stack.

syzbot reported:

BUG: KASAN: use-after-free in ip6_dst_idev include/net/ip6_fib.h:245 [inline]
BUG: KASAN: use-after-free in ip6_fragment+0x2724/0x2770 net/ipv6/ip6_output.c:951
Read of size 8 at addr ffff88801d403e80 by task syz-executor.3/7618

CPU: 1 PID: 7618 Comm: syz-executor.3 Not tainted 6.1.0-rc6-syzkaller-00012-g4312098baf37 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xd1/0x138 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:284 [inline]
 print_report+0x15e/0x45d mm/kasan/report.c:395
 kasan_report+0xbf/0x1f0 mm/kasan/report.c:495
 ip6_dst_idev include/net/ip6_fib.h:245 [inline]
 ip6_fragment+0x2724/0x2770 net/ipv6/ip6_output.c:951
 __ip6_finish_output net/ipv6/ip6_output.c:193 [inline]
 ip6_finish_output+0x9a3/0x1170 net/ipv6/ip6_output.c:206
 NF_HOOK_COND include/linux/netfilter.h:291 [inline]
 ip6_output+0x1f1/0x540 net/ipv6/ip6_output.c:227
 dst_output include/net/dst.h:445 [inline]
 ip6_local_out+0xb3/0x1a0 net/ipv6/output_core.c:161
 ip6_send_skb+0xbb/0x340 net/ipv6/ip6_output.c:1966
 udp_v6_send_skb+0x82a/0x18a0 net/ipv6/udp.c:1286
 udp_v6_push_pending_frames+0x140/0x200 net/ipv6/udp.c:1313
 udpv6_sendmsg+0x18da/0x2c80 net/ipv6/udp.c:1606
 inet6_sendmsg+0x9d/0xe0 net/ipv6/af_inet6.c:665
 sock_sendmsg_nosec net/socket.c:714 [inline]
 sock_sendmsg+0xd3/0x120 net/socket.c:734
 sock_write_iter+0x295/0x3d0 net/socket.c:1108
 call_write_iter include/linux/fs.h:2191 [inline]
 new_sync_write fs/read_write.c:491 [inline]
 vfs_write+0x9ed/0xdd0 fs/read_write.c:584
 ksys_write+0x1ec/0x250 fs/read_write.c:637
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7fde3588c0d9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fde365b6168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00007fde359ac050 RCX: 00007fde3588c0d9
RDX: 000000000000ffdc RSI: 00000000200000c0 RDI: 000000000000000a
RBP: 00007fde358e7ae9 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fde35acfb1f R14: 00007fde365b6300 R15: 0000000000022000
 &lt;/TASK&gt;

Allocated by task 7618:
 kasan_save_stack+0x22/0x40 mm/kasan/common.c:45
 kasan_set_track+0x25/0x30 mm/kasan/common.c:52
 __kasan_slab_alloc+0x82/0x90 mm/kasan/common.c:325
 kasan_slab_alloc include/linux/kasan.h:201 [inline]
 slab_post_alloc_hook mm/slab.h:737 [inline]
 slab_alloc_node mm/slub.c:3398 [inline]
 slab_alloc mm/slub.c:3406 [inline]
 __kmem_cache_alloc_lru mm/slub.c:3413 [inline]
 kmem_cache_alloc+0x2b4/0x3d0 mm/slub.c:3422
 dst_alloc+0x14a/0x1f0 net/core/dst.c:92
 ip6_dst_alloc+0x32/0xa0 net/ipv6/route.c:344
 ip6_rt_pcpu_alloc net/ipv6/route.c:1369 [inline]
 rt6_make_pcpu_route net/ipv6/route.c:1417 [inline]
 ip6_pol_route+0x901/0x1190 net/ipv6/route.c:2254
 pol_lookup_func include/net/ip6_fib.h:582 [inline]
 fib6_rule_lookup+0x52e/0x6f0 net/ipv6/fib6_rules.c:121
 ip6_route_output_flags_noref+0x2e6/0x380 net/ipv6/route.c:2625
 ip6_route_output_flags+0x76/0x320 net/ipv6/route.c:2638
 ip6_route_output include/net/ip6_route.h:98 [inline]
 ip6_dst_lookup_tail+0x5ab/0x1620 net/ipv6/ip6_output.c:1092
 ip6_dst_lookup_flow+0x90/0x1d0 net/ipv6/ip6_output.c:1222
 ip6_sk_dst_lookup_flow+0x553/0x980 net/ipv6/ip6_output.c:1260
 udpv6_sendmsg+0x151d/0x2c80 net/ipv6/udp.c:1554
 inet6_sendmsg+0x9d/0xe0 net/ipv6/af_inet6.c:665
 sock_sendmsg_nosec n
---truncated---</Note>
    </Notes>
    <CVE>CVE-2022-48956</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48956.html</URL>
        <Description>CVE-2022-48956</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231893</URL>
        <Description>SUSE Bug 1231893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232799</URL>
        <Description>SUSE Bug 1232799</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ethernet: aeroflex: fix potential skb leak in greth_init_rings()

The greth_init_rings() function won't free the newly allocated skb when
dma_mapping_error() returns error, so add dev_kfree_skb() to fix it.

Compile tested only.</Note>
    </Notes>
    <CVE>CVE-2022-48958</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48958.html</URL>
        <Description>CVE-2022-48958</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231889</URL>
        <Description>SUSE Bug 1231889</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: hisilicon: Fix potential use-after-free in hix5hd2_rx()

The skb is delivered to napi_gro_receive() which may free it, after
calling this, dereferencing skb may trigger use-after-free.</Note>
    </Notes>
    <CVE>CVE-2022-48960</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48960.html</URL>
        <Description>CVE-2022-48960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231979</URL>
        <Description>SUSE Bug 1231979</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231980</URL>
        <Description>SUSE Bug 1231980</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: hisilicon: Fix potential use-after-free in hisi_femac_rx()

The skb is delivered to napi_gro_receive() which may free it, after
calling this, dereferencing skb may trigger use-after-free.</Note>
    </Notes>
    <CVE>CVE-2022-48962</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48962.html</URL>
        <Description>CVE-2022-48962</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232286</URL>
        <Description>SUSE Bug 1232286</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232801</URL>
        <Description>SUSE Bug 1232801</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: mvneta: Prevent out of bounds read in mvneta_config_rss()

The pp-&gt;indir[0] value comes from the user.  It is passed to:

	if (cpu_online(pp-&gt;rxq_def))

inside the mvneta_percpu_elect() function.  It needs bounds checkeding
to ensure that it is not beyond the end of the cpu bitmap.</Note>
    </Notes>
    <CVE>CVE-2022-48966</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48966.html</URL>
        <Description>CVE-2022-48966</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232191</URL>
        <Description>SUSE Bug 1232191</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

NFC: nci: Bounds check struct nfc_target arrays

While running under CONFIG_FORTIFY_SOURCE=y, syzkaller reported:

  memcpy: detected field-spanning write (size 129) of single field "target-&gt;sensf_res" at net/nfc/nci/ntf.c:260 (size 18)

This appears to be a legitimate lack of bounds checking in
nci_add_new_protocol(). Add the missing checks.</Note>
    </Notes>
    <CVE>CVE-2022-48967</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48967.html</URL>
        <Description>CVE-2022-48967</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232304</URL>
        <Description>SUSE Bug 1232304</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232306</URL>
        <Description>SUSE Bug 1232306</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

xen-netfront: Fix NULL sring after live migration

A NAPI is setup for each network sring to poll data to kernel
The sring with source host is destroyed before live migration and
new sring with target host is setup after live migration.
The NAPI for the old sring is not deleted until setup new sring
with target host after migration. With busy_poll/busy_read enabled,
the NAPI can be polled before got deleted when resume VM.

BUG: unable to handle kernel NULL pointer dereference at
0000000000000008
IP: xennet_poll+0xae/0xd20
PGD 0 P4D 0
Oops: 0000 [#1] SMP PTI
Call Trace:
 finish_task_switch+0x71/0x230
 timerqueue_del+0x1d/0x40
 hrtimer_try_to_cancel+0xb5/0x110
 xennet_alloc_rx_buffers+0x2a0/0x2a0
 napi_busy_loop+0xdb/0x270
 sock_poll+0x87/0x90
 do_sys_poll+0x26f/0x580
 tracing_map_insert+0x1d4/0x2f0
 event_hist_trigger+0x14a/0x260

 finish_task_switch+0x71/0x230
 __schedule+0x256/0x890
 recalc_sigpending+0x1b/0x50
 xen_sched_clock+0x15/0x20
 __rb_reserve_next+0x12d/0x140
 ring_buffer_lock_reserve+0x123/0x3d0
 event_triggers_call+0x87/0xb0
 trace_event_buffer_commit+0x1c4/0x210
 xen_clocksource_get_cycles+0x15/0x20
 ktime_get_ts64+0x51/0xf0
 SyS_ppoll+0x160/0x1a0
 SyS_ppoll+0x160/0x1a0
 do_syscall_64+0x73/0x130
 entry_SYSCALL_64_after_hwframe+0x41/0xa6
...
RIP: xennet_poll+0xae/0xd20 RSP: ffffb4f041933900
CR2: 0000000000000008
---[ end trace f8601785b354351c ]---

xen frontend should remove the NAPIs for the old srings before live
migration as the bond srings are destroyed

There is a tiny window between the srings are set to NULL and
the NAPIs are disabled, It is safe as the NAPI threads are still
frozen at that time</Note>
    </Notes>
    <CVE>CVE-2022-48969</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48969.html</URL>
        <Description>CVE-2022-48969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232026</URL>
        <Description>SUSE Bug 1232026</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Fix not cleanup led when bt_init fails

bt_init() calls bt_leds_init() to register led, but if it fails later,
bt_leds_cleanup() is not called to unregister it.

This can cause panic if the argument "bluetooth-power" in text is freed
and then another led_trigger_register() tries to access it:

BUG: unable to handle page fault for address: ffffffffc06d3bc0
RIP: 0010:strcmp+0xc/0x30
  Call Trace:
    &lt;TASK&gt;
    led_trigger_register+0x10d/0x4f0
    led_trigger_register_simple+0x7d/0x100
    bt_init+0x39/0xf7 [bluetooth]
    do_one_initcall+0xd0/0x4e0</Note>
    </Notes>
    <CVE>CVE-2022-48971</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48971.html</URL>
        <Description>CVE-2022-48971</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232037</URL>
        <Description>SUSE Bug 1232037</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mac802154: fix missing INIT_LIST_HEAD in ieee802154_if_add()

Kernel fault injection test reports null-ptr-deref as follows:

BUG: kernel NULL pointer dereference, address: 0000000000000008
RIP: 0010:cfg802154_netdev_notifier_call+0x120/0x310 include/linux/list.h:114
Call Trace:
 &lt;TASK&gt;
 raw_notifier_call_chain+0x6d/0xa0 kernel/notifier.c:87
 call_netdevice_notifiers_info+0x6e/0xc0 net/core/dev.c:1944
 unregister_netdevice_many_notify+0x60d/0xcb0 net/core/dev.c:1982
 unregister_netdevice_queue+0x154/0x1a0 net/core/dev.c:10879
 register_netdevice+0x9a8/0xb90 net/core/dev.c:10083
 ieee802154_if_add+0x6ed/0x7e0 net/mac802154/iface.c:659
 ieee802154_register_hw+0x29c/0x330 net/mac802154/main.c:229
 mcr20a_probe+0xaaa/0xcb1 drivers/net/ieee802154/mcr20a.c:1316

ieee802154_if_add() allocates wpan_dev as netdev's private data, but not
init the list in struct wpan_dev. cfg802154_netdev_notifier_call() manage
the list when device register/unregister, and may lead to null-ptr-deref.

Use INIT_LIST_HEAD() on it to initialize it correctly.</Note>
    </Notes>
    <CVE>CVE-2022-48972</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48972.html</URL>
        <Description>CVE-2022-48972</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232025</URL>
        <Description>SUSE Bug 1232025</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

gpio: amd8111: Fix PCI device reference count leak

for_each_pci_dev() is implemented by pci_get_device(). The comment of
pci_get_device() says that it will increase the reference count for the
returned pci_dev and also decrease the reference count for the input
pci_dev @from if it is not NULL.

If we break for_each_pci_dev() loop with pdev not NULL, we need to call
pci_dev_put() to decrease the reference count. Add the missing
pci_dev_put() after the 'out' label. Since pci_dev_put() can handle NULL
input parameter, there is no problem for the 'Device not found' branch.
For the normal path, add pci_dev_put() in amd_gpio_exit().</Note>
    </Notes>
    <CVE>CVE-2022-48973</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48973.html</URL>
        <Description>CVE-2022-48973</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232039</URL>
        <Description>SUSE Bug 1232039</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

HID: core: fix shift-out-of-bounds in hid_report_raw_event

Syzbot reported shift-out-of-bounds in hid_report_raw_event.

microsoft 0003:045E:07DA.0001: hid_field_extract() called with n (128) &gt;
32! (swapper/0)
======================================================================
UBSAN: shift-out-of-bounds in drivers/hid/hid-core.c:1323:20
shift exponent 127 is too large for 32-bit type 'int'
CPU: 0 PID: 0 Comm: swapper/0 Not tainted
6.1.0-rc4-syzkaller-00159-g4bbf3422df78 #0
Hardware name: Google Compute Engine/Google Compute Engine, BIOS
Google 10/26/2022
Call Trace:
 &lt;IRQ&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x1e3/0x2cb lib/dump_stack.c:106
 ubsan_epilogue lib/ubsan.c:151 [inline]
 __ubsan_handle_shift_out_of_bounds+0x3a6/0x420 lib/ubsan.c:322
 snto32 drivers/hid/hid-core.c:1323 [inline]
 hid_input_fetch_field drivers/hid/hid-core.c:1572 [inline]
 hid_process_report drivers/hid/hid-core.c:1665 [inline]
 hid_report_raw_event+0xd56/0x18b0 drivers/hid/hid-core.c:1998
 hid_input_report+0x408/0x4f0 drivers/hid/hid-core.c:2066
 hid_irq_in+0x459/0x690 drivers/hid/usbhid/hid-core.c:284
 __usb_hcd_giveback_urb+0x369/0x530 drivers/usb/core/hcd.c:1671
 dummy_timer+0x86b/0x3110 drivers/usb/gadget/udc/dummy_hcd.c:1988
 call_timer_fn+0xf5/0x210 kernel/time/timer.c:1474
 expire_timers kernel/time/timer.c:1519 [inline]
 __run_timers+0x76a/0x980 kernel/time/timer.c:1790
 run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1803
 __do_softirq+0x277/0x75b kernel/softirq.c:571
 __irq_exit_rcu+0xec/0x170 kernel/softirq.c:650
 irq_exit_rcu+0x5/0x20 kernel/softirq.c:662
 sysvec_apic_timer_interrupt+0x91/0xb0 arch/x86/kernel/apic/apic.c:1107
======================================================================

If the size of the integer (unsigned n) is bigger than 32 in snto32(),
shift exponent will be too large for 32-bit type 'int', resulting in a
shift-out-of-bounds bug.
Fix this by adding a check on the size of the integer (unsigned n) in
snto32(). To add support for n greater than 32 bits, set n to 32, if n
is greater than 32.</Note>
    </Notes>
    <CVE>CVE-2022-48978</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48978.html</URL>
        <Description>CVE-2022-48978</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232038</URL>
        <Description>SUSE Bug 1232038</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: mana: Fix race on per-CQ variable napi work_done

After calling napi_complete_done(), the NAPIF_STATE_SCHED bit may be
cleared, and another CPU can start napi thread and access per-CQ variable,
cq-&gt;work_done. If the other thread (for example, from busy_poll) sets
it to a value &gt;= budget, this thread will continue to run when it should
stop, and cause memory corruption and panic.

To fix this issue, save the per-CQ work_done variable in a local variable
before napi_complete_done(), so it won't be corrupted by a possible
concurrent thread after napi_complete_done().

Also, add a flag bit to advertise to the NIC firmware: the NAPI work_done
variable race is fixed, so the driver is able to reliably support features
like busy_poll.</Note>
    </Notes>
    <CVE>CVE-2022-48985</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48985.html</URL>
        <Description>CVE-2022-48985</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231958</URL>
        <Description>SUSE Bug 1231958</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

memcg: fix possible use-after-free in memcg_write_event_control()

memcg_write_event_control() accesses the dentry-&gt;d_name of the specified
control fd to route the write call.  As a cgroup interface file can't be
renamed, it's safe to access d_name as long as the specified file is a
regular cgroup file.  Also, as these cgroup interface files can't be
removed before the directory, it's safe to access the parent too.

Prior to 347c4a874710 ("memcg: remove cgroup_event-&gt;cft"), there was a
call to __file_cft() which verified that the specified file is a regular
cgroupfs file before further accesses.  The cftype pointer returned from
__file_cft() was no longer necessary and the commit inadvertently dropped
the file type check with it allowing any file to slip through.  With the
invarients broken, the d_name and parent accesses can now race against
renames and removals of arbitrary files and cause use-after-free's.

Fix the bug by resurrecting the file type check in __file_cft().  Now that
cgroupfs is implemented through kernfs, checking the file operations needs
to go through a layer of indirection.  Instead, let's check the superblock
and dentry type.</Note>
    </Notes>
    <CVE>CVE-2022-48988</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48988.html</URL>
        <Description>CVE-2022-48988</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232069</URL>
        <Description>SUSE Bug 1232069</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232106</URL>
        <Description>SUSE Bug 1232106</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mm/khugepaged: invoke MMU notifiers in shmem/file collapse paths

Any codepath that zaps page table entries must invoke MMU notifiers to
ensure that secondary MMUs (like KVM) don't keep accessing pages which
aren't mapped anymore.  Secondary MMUs don't hold their own references to
pages that are mirrored over, so failing to notify them can lead to page
use-after-free.

I'm marking this as addressing an issue introduced in commit f3f0e1d2150b
("khugepaged: add support of collapse for tmpfs/shmem pages"), but most of
the security impact of this only came in commit 27e1f8273113 ("khugepaged:
enable collapse pmd for pte-mapped THP"), which actually omitted flushes
for the removal of present PTEs, not just for the removal of empty page
tables.</Note>
    </Notes>
    <CVE>CVE-2022-48991</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48991.html</URL>
        <Description>CVE-2022-48991</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232070</URL>
        <Description>SUSE Bug 1232070</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232372</URL>
        <Description>SUSE Bug 1232372</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ASoC: soc-pcm: Add NULL check in BE reparenting

Add NULL check in dpcm_be_reparent API, to handle
kernel NULL pointer dereference error.
The issue occurred in fuzzing test.</Note>
    </Notes>
    <CVE>CVE-2022-48992</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48992.html</URL>
        <Description>CVE-2022-48992</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232071</URL>
        <Description>SUSE Bug 1232071</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

char: tpm: Protect tpm_pm_suspend with locks

Currently tpm transactions are executed unconditionally in
tpm_pm_suspend() function, which may lead to races with other tpm
accessors in the system.

Specifically, the hw_random tpm driver makes use of tpm_get_random(),
and this function is called in a loop from a kthread, which means it's
not frozen alongside userspace, and so can race with the work done
during system suspend:

  tpm tpm0: tpm_transmit: tpm_recv: error -52
  tpm tpm0: invalid TPM_STS.x 0xff, dumping stack for forensics
  CPU: 0 PID: 1 Comm: init Not tainted 6.1.0-rc5+ #135
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.0-20220807_005459-localhost 04/01/2014
  Call Trace:
   tpm_tis_status.cold+0x19/0x20
   tpm_transmit+0x13b/0x390
   tpm_transmit_cmd+0x20/0x80
   tpm1_pm_suspend+0xa6/0x110
   tpm_pm_suspend+0x53/0x80
   __pnp_bus_suspend+0x35/0xe0
   __device_suspend+0x10f/0x350

Fix this by calling tpm_try_get_ops(), which itself is a wrapper around
tpm_chip_start(), but takes the appropriate mutex.

[Jason: reworked commit message, added metadata]</Note>
    </Notes>
    <CVE>CVE-2022-48997</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48997.html</URL>
        <Description>CVE-2022-48997</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232035</URL>
        <Description>SUSE Bug 1232035</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Fix PCI device refcount leak in has_external_pci()

for_each_pci_dev() is implemented by pci_get_device(). The comment of
pci_get_device() says that it will increase the reference count for the
returned pci_dev and also decrease the reference count for the input
pci_dev @from if it is not NULL.

If we break for_each_pci_dev() loop with pdev not NULL, we need to call
pci_dev_put() to decrease the reference count. Add the missing
pci_dev_put() before 'return true' to avoid reference count leak.</Note>
    </Notes>
    <CVE>CVE-2022-49000</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-49000.html</URL>
        <Description>CVE-2022-49000</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232123</URL>
        <Description>SUSE Bug 1232123</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Fix PCI device refcount leak in dmar_dev_scope_init()

for_each_pci_dev() is implemented by pci_get_device(). The comment of
pci_get_device() says that it will increase the reference count for the
returned pci_dev and also decrease the reference count for the input
pci_dev @from if it is not NULL.

If we break for_each_pci_dev() loop with pdev not NULL, we need to call
pci_dev_put() to decrease the reference count. Add the missing
pci_dev_put() for the error path to avoid reference count leak.</Note>
    </Notes>
    <CVE>CVE-2022-49002</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-49002.html</URL>
        <Description>CVE-2022-49002</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232133</URL>
        <Description>SUSE Bug 1232133</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

hwmon: (coretemp) Check for null before removing sysfs attrs

If coretemp_add_core() gets an error then pdata-&gt;core_data[indx]
is already NULL and has been kfreed. Don't pass that to
sysfs_remove_group() as that will crash in sysfs_remove_group().

[Shortened for readability]
[91854.020159] sysfs: cannot create duplicate filename '/devices/platform/coretemp.0/hwmon/hwmon2/temp20_label'
&lt;cpu offline&gt;
[91855.126115] BUG: kernel NULL pointer dereference, address: 0000000000000188
[91855.165103] #PF: supervisor read access in kernel mode
[91855.194506] #PF: error_code(0x0000) - not-present page
[91855.224445] PGD 0 P4D 0
[91855.238508] Oops: 0000 [#1] PREEMPT SMP PTI
...
[91855.342716] RIP: 0010:sysfs_remove_group+0xc/0x80
...
[91855.796571] Call Trace:
[91855.810524]  coretemp_cpu_offline+0x12b/0x1dd [coretemp]
[91855.841738]  ? coretemp_cpu_online+0x180/0x180 [coretemp]
[91855.871107]  cpuhp_invoke_callback+0x105/0x4b0
[91855.893432]  cpuhp_thread_fun+0x8e/0x150
...

Fix this by checking for NULL first.</Note>
    </Notes>
    <CVE>CVE-2022-49010</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-49010.html</URL>
        <Description>CVE-2022-49010</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232172</URL>
        <Description>SUSE Bug 1232172</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new()

As comment of pci_get_domain_bus_and_slot() says, it returns
a pci device with refcount increment, when finish using it,
the caller must decrement the reference count by calling
pci_dev_put(). So call it after using to avoid refcount leak.</Note>
    </Notes>
    <CVE>CVE-2022-49011</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-49011.html</URL>
        <Description>CVE-2022-49011</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232006</URL>
        <Description>SUSE Bug 1232006</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: tun: Fix use-after-free in tun_detach()

syzbot reported use-after-free in tun_detach() [1].  This causes call
trace like below:

==================================================================
BUG: KASAN: use-after-free in notifier_call_chain+0x1ee/0x200 kernel/notifier.c:75
Read of size 8 at addr ffff88807324e2a8 by task syz-executor.0/3673

CPU: 0 PID: 3673 Comm: syz-executor.0 Not tainted 6.1.0-rc5-syzkaller-00044-gcc675d22e422 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xd1/0x138 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:284 [inline]
 print_report+0x15e/0x461 mm/kasan/report.c:395
 kasan_report+0xbf/0x1f0 mm/kasan/report.c:495
 notifier_call_chain+0x1ee/0x200 kernel/notifier.c:75
 call_netdevice_notifiers_info+0x86/0x130 net/core/dev.c:1942
 call_netdevice_notifiers_extack net/core/dev.c:1983 [inline]
 call_netdevice_notifiers net/core/dev.c:1997 [inline]
 netdev_wait_allrefs_any net/core/dev.c:10237 [inline]
 netdev_run_todo+0xbc6/0x1100 net/core/dev.c:10351
 tun_detach drivers/net/tun.c:704 [inline]
 tun_chr_close+0xe4/0x190 drivers/net/tun.c:3467
 __fput+0x27c/0xa90 fs/file_table.c:320
 task_work_run+0x16f/0x270 kernel/task_work.c:179
 exit_task_work include/linux/task_work.h:38 [inline]
 do_exit+0xb3d/0x2a30 kernel/exit.c:820
 do_group_exit+0xd4/0x2a0 kernel/exit.c:950
 get_signal+0x21b1/0x2440 kernel/signal.c:2858
 arch_do_signal_or_restart+0x86/0x2300 arch/x86/kernel/signal.c:869
 exit_to_user_mode_loop kernel/entry/common.c:168 [inline]
 exit_to_user_mode_prepare+0x15f/0x250 kernel/entry/common.c:203
 __syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline]
 syscall_exit_to_user_mode+0x1d/0x50 kernel/entry/common.c:296
 do_syscall_64+0x46/0xb0 arch/x86/entry/common.c:86
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

The cause of the issue is that sock_put() from __tun_detach() drops
last reference count for struct net, and then notifier_call_chain()
from netdev_state_change() accesses that struct net.

This patch fixes the issue by calling sock_put() from tun_detach()
after all necessary accesses for the struct net has done.</Note>
    </Notes>
    <CVE>CVE-2022-49014</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-49014.html</URL>
        <Description>CVE-2022-49014</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231890</URL>
        <Description>SUSE Bug 1231890</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232818</URL>
        <Description>SUSE Bug 1232818</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: hsr: Fix potential use-after-free

The skb is delivered to netif_rx() which may free it, after calling this,
dereferencing skb may trigger use-after-free.</Note>
    </Notes>
    <CVE>CVE-2022-49015</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-49015.html</URL>
        <Description>CVE-2022-49015</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231938</URL>
        <Description>SUSE Bug 1231938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233021</URL>
        <Description>SUSE Bug 1233021</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/9p: Fix a potential socket leak in p9_socket_open

Both p9_fd_create_tcp() and p9_fd_create_unix() will call
p9_socket_open(). If the creation of p9_trans_fd fails,
p9_fd_create_tcp() and p9_fd_create_unix() will return an
error directly instead of releasing the cscoket, which will
result in a socket leak.

This patch adds sock_release() to fix the leak issue.</Note>
    </Notes>
    <CVE>CVE-2022-49020</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-49020.html</URL>
        <Description>CVE-2022-49020</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232175</URL>
        <Description>SUSE Bug 1232175</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: phy: fix null-ptr-deref while probe() failed

I got a null-ptr-deref report as following when doing fault injection test:

BUG: kernel NULL pointer dereference, address: 0000000000000058
Oops: 0000 [#1] PREEMPT SMP KASAN PTI
CPU: 1 PID: 253 Comm: 507-spi-dm9051 Tainted: G    B            N 6.1.0-rc3+
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
RIP: 0010:klist_put+0x2d/0xd0
Call Trace:
 &lt;TASK&gt;
 klist_remove+0xf1/0x1c0
 device_release_driver_internal+0x23e/0x2d0
 bus_remove_device+0x1bd/0x240
 device_del+0x357/0x770
 phy_device_remove+0x11/0x30
 mdiobus_unregister+0xa5/0x140
 release_nodes+0x6a/0xa0
 devres_release_all+0xf8/0x150
 device_unbind_cleanup+0x19/0xd0

//probe path:
phy_device_register()
  device_add()

phy_connect
  phy_attach_direct() //set device driver
    probe() //it's failed, driver is not bound
    device_bind_driver() // probe failed, it's not called

//remove path:
phy_device_remove()
  device_del()
    device_release_driver_internal()
      __device_release_driver() //dev-&gt;drv is not NULL
        klist_remove() &lt;- knode_driver is not added yet, cause null-ptr-deref

In phy_attach_direct(), after setting the 'dev-&gt;driver', probe() fails,
device_bind_driver() is not called, so the knode_driver-&gt;n_klist is not
set, then it causes null-ptr-deref in __device_release_driver() while
deleting device. Fix this by setting dev-&gt;driver to NULL in the error
path in phy_attach_direct().</Note>
    </Notes>
    <CVE>CVE-2022-49021</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-49021.html</URL>
        <Description>CVE-2022-49021</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231939</URL>
        <Description>SUSE Bug 1231939</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

e100: Fix possible use after free in e100_xmit_prepare

In e100_xmit_prepare(), if we can't map the skb, then return -ENOMEM, so
e100_xmit_frame() will return NETDEV_TX_BUSY and the upper layer will
resend the skb. But the skb is already freed, which will cause UAF bug
when the upper layer resends the skb.

Remove the harmful free.</Note>
    </Notes>
    <CVE>CVE-2022-49026</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-49026.html</URL>
        <Description>CVE-2022-49026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231997</URL>
        <Description>SUSE Bug 1231997</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

iavf: Fix error handling in iavf_init_module()

The iavf_init_module() won't destroy workqueue when pci_register_driver()
failed. Call destroy_workqueue() when pci_register_driver() failed to
prevent the resource leak.

Similar to the handling of u132_hcd_init in commit f276e002793c
("usb: u132-hcd: fix resource leak")</Note>
    </Notes>
    <CVE>CVE-2022-49027</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-49027.html</URL>
        <Description>CVE-2022-49027</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232007</URL>
        <Description>SUSE Bug 1232007</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ixgbevf: Fix resource leak in ixgbevf_init_module()

ixgbevf_init_module() won't destroy the workqueue created by
create_singlethread_workqueue() when pci_register_driver() failed. Add
destroy_workqueue() in fail path to prevent the resource leak.

Similar to the handling of u132_hcd_init in commit f276e002793c
("usb: u132-hcd: fix resource leak")</Note>
    </Notes>
    <CVE>CVE-2022-49028</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-49028.html</URL>
        <Description>CVE-2022-49028</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231996</URL>
        <Description>SUSE Bug 1231996</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails

Smatch report warning as follows:

drivers/hwmon/ibmpex.c:509 ibmpex_register_bmc() warn:
  '&amp;data-&gt;list' not removed from list

If ibmpex_find_sensors() fails in ibmpex_register_bmc(), data will
be freed, but data-&gt;list will not be removed from driver_data.bmc_data,
then list traversal may cause UAF.

Fix by removeing it from driver_data.bmc_data before free().</Note>
    </Notes>
    <CVE>CVE-2022-49029</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-49029.html</URL>
        <Description>CVE-2022-49029</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231995</URL>
        <Description>SUSE Bug 1231995</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel before 6.5.9, there is a NULL pointer dereference in send_acknowledge in net/nfc/nci/spi.c.</Note>
    </Notes>
    <CVE>CVE-2023-46343</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-46343.html</URL>
        <Description>CVE-2023-46343</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1219125</URL>
        <Description>SUSE Bug 1219125</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tcp: do not accept ACK of bytes we never sent

This patch is based on a detailed report and ideas from Yepeng Pan
and Christian Rossow.

ACK seq validation is currently following RFC 5961 5.2 guidelines:

   The ACK value is considered acceptable only if
   it is in the range of ((SND.UNA - MAX.SND.WND) &lt;= SEG.ACK &lt;=
   SND.NXT).  All incoming segments whose ACK value doesn't satisfy the
   above condition MUST be discarded and an ACK sent back.  It needs to
   be noted that RFC 793 on page 72 (fifth check) says: "If the ACK is a
   duplicate (SEG.ACK &lt; SND.UNA), it can be ignored.  If the ACK
   acknowledges something not yet sent (SEG.ACK &gt; SND.NXT) then send an
   ACK, drop the segment, and return".  The "ignored" above implies that
   the processing of the incoming data segment continues, which means
   the ACK value is treated as acceptable.  This mitigation makes the
   ACK check more stringent since any ACK &lt; SND.UNA wouldn't be
   accepted, instead only ACKs that are in the range ((SND.UNA -
   MAX.SND.WND) &lt;= SEG.ACK &lt;= SND.NXT) get through.

This can be refined for new (and possibly spoofed) flows,
by not accepting ACK for bytes that were never sent.

This greatly improves TCP security at a little cost.

I added a Fixes: tag to make sure this patch will reach stable trees,
even if the 'blamed' patch was adhering to the RFC.

tp-&gt;bytes_acked was added in linux-4.2

Following packetdrill test (courtesy of Yepeng Pan) shows
the issue at hand:

0 socket(..., SOCK_STREAM, IPPROTO_TCP) = 3
+0 setsockopt(3, SOL_SOCKET, SO_REUSEADDR, [1], 4) = 0
+0 bind(3, ..., ...) = 0
+0 listen(3, 1024) = 0

// ---------------- Handshake ------------------- //

// when window scale is set to 14 the window size can be extended to
// 65535 * (2^14) = 1073725440. Linux would accept an ACK packet
// with ack number in (Server_ISN+1-1073725440. Server_ISN+1)
// ,though this ack number acknowledges some data never
// sent by the server.

+0 &lt; S 0:0(0) win 65535 &lt;mss 1400,nop,wscale 14&gt;
+0 &gt; S. 0:0(0) ack 1 &lt;...&gt;
+0 &lt; . 1:1(0) ack 1 win 65535
+0 accept(3, ..., ...) = 4

// For the established connection, we send an ACK packet,
// the ack packet uses ack number 1 - 1073725300 + 2^32,
// where 2^32 is used to wrap around.
// Note: we used 1073725300 instead of 1073725440 to avoid possible
// edge cases.
// 1 - 1073725300 + 2^32 = 3221241997

// Oops, old kernels happily accept this packet.
+0 &lt; . 1:1001(1000) ack 3221241997 win 65535

// After the kernel fix the following will be replaced by a challenge ACK,
// and prior malicious frame would be dropped.
+0 &gt; . 1:1(0) ack 1001</Note>
    </Notes>
    <CVE>CVE-2023-52881</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52881.html</URL>
        <Description>CVE-2023-52881</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223384</URL>
        <Description>SUSE Bug 1223384</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225611</URL>
        <Description>SUSE Bug 1225611</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226152</URL>
        <Description>SUSE Bug 1226152</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

xhci: Fix null pointer dereference when host dies

Make sure xhci_free_dev() and xhci_kill_endpoint_urbs() do not race
and cause null pointer dereference when host suddenly dies.

Usb core may call xhci_free_dev() which frees the xhci-&gt;devs[slot_id]
virt device at the same time that xhci_kill_endpoint_urbs() tries to
loop through all the device's endpoints, checking if there are any
cancelled urbs left to give back.

hold the xhci spinlock while freeing the virt device</Note>
    </Notes>
    <CVE>CVE-2023-52898</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52898.html</URL>
        <Description>CVE-2023-52898</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1229568</URL>
        <Description>SUSE Bug 1229568</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

media: pci: cx23885: check cx23885_vdev_init() return

cx23885_vdev_init() can return a NULL pointer, but that pointer
is used in the next line without a check.

Add a NULL pointer check and go to the error unwind if it is NULL.</Note>
    </Notes>
    <CVE>CVE-2023-52918</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52918.html</URL>
        <Description>CVE-2023-52918</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232047</URL>
        <Description>SUSE Bug 1232047</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nfc: nci: fix possible NULL pointer dereference in send_acknowledge()

Handle memory allocation failure from nci_skb_alloc() (calling
alloc_skb()) to avoid possible NULL pointer dereference.</Note>
    </Notes>
    <CVE>CVE-2023-52919</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52919.html</URL>
        <Description>CVE-2023-52919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231988</URL>
        <Description>SUSE Bug 1231988</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on `struct net_device`, and a use-after-free can be triggered by racing between the free on the struct and the access through the `skbtxq` global queue. This could lead to a denial of service condition or potential code execution.</Note>
    </Notes>
    <CVE>CVE-2023-6270</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-6270.html</URL>
        <Description>CVE-2023-6270</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218562</URL>
        <Description>SUSE Bug 1218562</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218813</URL>
        <Description>SUSE Bug 1218813</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221578</URL>
        <Description>SUSE Bug 1221578</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221598</URL>
        <Description>SUSE Bug 1221598</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223016</URL>
        <Description>SUSE Bug 1223016</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227675</URL>
        <Description>SUSE Bug 1227675</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: ip_tunnel: prevent perpetual headroom growth

syzkaller triggered following kasan splat:
BUG: KASAN: use-after-free in __skb_flow_dissect+0x19d1/0x7a50 net/core/flow_dissector.c:1170
Read of size 1 at addr ffff88812fb4000e by task syz-executor183/5191
[..]
 kasan_report+0xda/0x110 mm/kasan/report.c:588
 __skb_flow_dissect+0x19d1/0x7a50 net/core/flow_dissector.c:1170
 skb_flow_dissect_flow_keys include/linux/skbuff.h:1514 [inline]
 ___skb_get_hash net/core/flow_dissector.c:1791 [inline]
 __skb_get_hash+0xc7/0x540 net/core/flow_dissector.c:1856
 skb_get_hash include/linux/skbuff.h:1556 [inline]
 ip_tunnel_xmit+0x1855/0x33c0 net/ipv4/ip_tunnel.c:748
 ipip_tunnel_xmit+0x3cc/0x4e0 net/ipv4/ipip.c:308
 __netdev_start_xmit include/linux/netdevice.h:4940 [inline]
 netdev_start_xmit include/linux/netdevice.h:4954 [inline]
 xmit_one net/core/dev.c:3548 [inline]
 dev_hard_start_xmit+0x13d/0x6d0 net/core/dev.c:3564
 __dev_queue_xmit+0x7c1/0x3d60 net/core/dev.c:4349
 dev_queue_xmit include/linux/netdevice.h:3134 [inline]
 neigh_connected_output+0x42c/0x5d0 net/core/neighbour.c:1592
 ...
 ip_finish_output2+0x833/0x2550 net/ipv4/ip_output.c:235
 ip_finish_output+0x31/0x310 net/ipv4/ip_output.c:323
 ..
 iptunnel_xmit+0x5b4/0x9b0 net/ipv4/ip_tunnel_core.c:82
 ip_tunnel_xmit+0x1dbc/0x33c0 net/ipv4/ip_tunnel.c:831
 ipgre_xmit+0x4a1/0x980 net/ipv4/ip_gre.c:665
 __netdev_start_xmit include/linux/netdevice.h:4940 [inline]
 netdev_start_xmit include/linux/netdevice.h:4954 [inline]
 xmit_one net/core/dev.c:3548 [inline]
 dev_hard_start_xmit+0x13d/0x6d0 net/core/dev.c:3564
 ...

The splat occurs because skb-&gt;data points past skb-&gt;head allocated area.
This is because neigh layer does:
  __skb_pull(skb, skb_network_offset(skb));

... but skb_network_offset() returns a negative offset and __skb_pull()
arg is unsigned.  IOW, we skb-&gt;data gets "adjusted" by a huge value.

The negative value is returned because skb-&gt;head and skb-&gt;data distance is
more than 64k and skb-&gt;network_header (u16) has wrapped around.

The bug is in the ip_tunnel infrastructure, which can cause
dev-&gt;needed_headroom to increment ad infinitum.

The syzkaller reproducer consists of packets getting routed via a gre
tunnel, and route of gre encapsulated packets pointing at another (ipip)
tunnel.  The ipip encapsulation finds gre0 as next output device.

This results in the following pattern:

1). First packet is to be sent out via gre0.
Route lookup found an output device, ipip0.

2).
ip_tunnel_xmit for gre0 bumps gre0-&gt;needed_headroom based on the future
output device, rt.dev-&gt;needed_headroom (ipip0).

3).
ip output / start_xmit moves skb on to ipip0. which runs the same
code path again (xmit recursion).

4).
Routing step for the post-gre0-encap packet finds gre0 as output device
to use for ipip0 encapsulated packet.

tunl0-&gt;needed_headroom is then incremented based on the (already bumped)
gre0 device headroom.

This repeats for every future packet:

gre0-&gt;needed_headroom gets inflated because previous packets' ipip0 step
incremented rt-&gt;dev (gre0) headroom, and ipip0 incremented because gre0
needed_headroom was increased.

For each subsequent packet, gre/ipip0-&gt;needed_headroom grows until
post-expand-head reallocations result in a skb-&gt;head/data distance of
more than 64k.

Once that happens, skb-&gt;network_header (u16) wraps around when
pskb_expand_head tries to make sure that skb_network_offset() is unchanged
after the headroom expansion/reallocation.

After this skb_network_offset(skb) returns a different (and negative)
result post headroom expansion.

The next trip to neigh layer (or anything else that would __skb_pull the
network header) makes skb-&gt;data point to a memory location outside
skb-&gt;head area.

v2: Cap the needed_headroom update to an arbitarily chosen upperlimit to
prevent perpetual increase instead of dropping the headroom increment
completely.</Note>
    </Notes>
    <CVE>CVE-2024-26804</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26804.html</URL>
        <Description>CVE-2024-26804</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222629</URL>
        <Description>SUSE Bug 1222629</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

media: edia: dvbdev: fix a use-after-free

In dvb_register_device, *pdvbdev is set equal to dvbdev, which is freed
in several error-handling paths. However, *pdvbdev is not set to NULL
after dvbdev's deallocation, causing use-after-frees in many places,
for example, in the following call chain:

budget_register
  |-&gt; dvb_dmxdev_init
        |-&gt; dvb_register_device
  |-&gt; dvb_dmxdev_release
        |-&gt; dvb_unregister_device
              |-&gt; dvb_remove_device
                    |-&gt; dvb_device_put
                          |-&gt; kref_put

When calling dvb_unregister_device, dmxdev-&gt;dvbdev (i.e. *pdvbdev in
dvb_register_device) could point to memory that had been freed in
dvb_register_device. Thereafter, this pointer is transferred to
kref_put and triggering a use-after-free.</Note>
    </Notes>
    <CVE>CVE-2024-27043</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-27043.html</URL>
        <Description>CVE-2024-27043</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218562</URL>
        <Description>SUSE Bug 1218562</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223824</URL>
        <Description>SUSE Bug 1223824</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223825</URL>
        <Description>SUSE Bug 1223825</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: bridge: xmit: make sure we have at least eth header len bytes

syzbot triggered an uninit value[1] error in bridge device's xmit path
by sending a short (less than ETH_HLEN bytes) skb. To fix it check if
we can actually pull that amount instead of assuming.

Tested with dropwatch:
 drop at: br_dev_xmit+0xb93/0x12d0 [bridge] (0xffffffffc06739b3)
 origin: software
 timestamp: Mon May 13 11:31:53 2024 778214037 nsec
 protocol: 0x88a8
 length: 2
 original length: 2
 drop reason: PKT_TOO_SMALL

[1]
BUG: KMSAN: uninit-value in br_dev_xmit+0x61d/0x1cb0 net/bridge/br_device.c:65
 br_dev_xmit+0x61d/0x1cb0 net/bridge/br_device.c:65
 __netdev_start_xmit include/linux/netdevice.h:4903 [inline]
 netdev_start_xmit include/linux/netdevice.h:4917 [inline]
 xmit_one net/core/dev.c:3531 [inline]
 dev_hard_start_xmit+0x247/0xa20 net/core/dev.c:3547
 __dev_queue_xmit+0x34db/0x5350 net/core/dev.c:4341
 dev_queue_xmit include/linux/netdevice.h:3091 [inline]
 __bpf_tx_skb net/core/filter.c:2136 [inline]
 __bpf_redirect_common net/core/filter.c:2180 [inline]
 __bpf_redirect+0x14a6/0x1620 net/core/filter.c:2187
 ____bpf_clone_redirect net/core/filter.c:2460 [inline]
 bpf_clone_redirect+0x328/0x470 net/core/filter.c:2432
 ___bpf_prog_run+0x13fe/0xe0f0 kernel/bpf/core.c:1997
 __bpf_prog_run512+0xb5/0xe0 kernel/bpf/core.c:2238
 bpf_dispatcher_nop_func include/linux/bpf.h:1234 [inline]
 __bpf_prog_run include/linux/filter.h:657 [inline]
 bpf_prog_run include/linux/filter.h:664 [inline]
 bpf_test_run+0x499/0xc30 net/bpf/test_run.c:425
 bpf_prog_test_run_skb+0x14ea/0x1f20 net/bpf/test_run.c:1058
 bpf_prog_test_run+0x6b7/0xad0 kernel/bpf/syscall.c:4269
 __sys_bpf+0x6aa/0xd90 kernel/bpf/syscall.c:5678
 __do_sys_bpf kernel/bpf/syscall.c:5767 [inline]
 __se_sys_bpf kernel/bpf/syscall.c:5765 [inline]
 __x64_sys_bpf+0xa0/0xe0 kernel/bpf/syscall.c:5765
 x64_sys_call+0x96b/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:322
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f</Note>
    </Notes>
    <CVE>CVE-2024-38538</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38538.html</URL>
        <Description>CVE-2024-38538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226606</URL>
        <Description>SUSE Bug 1226606</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING

Xiao reported that lvm2 test lvconvert-raid-takeover.sh can hang with
small possibility, the root cause is exactly the same as commit
bed9e27baf52 ("Revert "md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d"")

However, Dan reported another hang after that, and junxiao investigated
the problem and found out that this is caused by plugged bio can't issue
from raid5d().

Current implementation in raid5d() has a weird dependence:

1) md_check_recovery() from raid5d() must hold 'reconfig_mutex' to clear
   MD_SB_CHANGE_PENDING;
2) raid5d() handles IO in a deadloop, until all IO are issued;
3) IO from raid5d() must wait for MD_SB_CHANGE_PENDING to be cleared;

This behaviour is introduce before v2.6, and for consequence, if other
context hold 'reconfig_mutex', and md_check_recovery() can't update
super_block, then raid5d() will waste one cpu 100% by the deadloop, until
'reconfig_mutex' is released.

Refer to the implementation from raid1 and raid10, fix this problem by
skipping issue IO if MD_SB_CHANGE_PENDING is still set after
md_check_recovery(), daemon thread will be woken up when 'reconfig_mutex'
is released. Meanwhile, the hang problem will be fixed as well.</Note>
    </Notes>
    <CVE>CVE-2024-39476</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-39476.html</URL>
        <Description>CVE-2024-39476</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227437</URL>
        <Description>SUSE Bug 1227437</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="50">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

i2c: lpi2c: Avoid calling clk_get_rate during transfer

Instead of repeatedly calling clk_get_rate for each transfer, lock
the clock rate and cache the value.
A deadlock has been observed while adding tlv320aic32x4 audio codec to
the system. When this clock provider adds its clock, the clk mutex is
locked already, it needs to access i2c, which in return needs the mutex
for clk_get_rate as well.</Note>
    </Notes>
    <CVE>CVE-2024-40965</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-40965.html</URL>
        <Description>CVE-2024-40965</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227885</URL>
        <Description>SUSE Bug 1227885</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="51">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()

xattr in ocfs2 maybe 'non-indexed', which saved with additional space
requested.  It's better to check if the memory is out of bound before
memcmp, although this possibility mainly comes from crafted poisonous
images.</Note>
    </Notes>
    <CVE>CVE-2024-41016</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-41016.html</URL>
        <Description>CVE-2024-41016</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228410</URL>
        <Description>SUSE Bug 1228410</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="52">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nvme-fabrics: use reserved tag for reg read/write command

In some scenarios, if too many commands are issued by nvme command in
the same time by user tasks, this may exhaust all tags of admin_q. If
a reset (nvme reset or IO timeout) occurs before these commands finish,
reconnect routine may fail to update nvme regs due to insufficient tags,
which will cause kernel hang forever. In order to workaround this issue,
maybe we can let reg_read32()/reg_read64()/reg_write32() use reserved
tags. This maybe safe for nvmf:

1. For the disable ctrl path,  we will not issue connect command
2. For the enable ctrl / fw activate path, since connect and reg_xx()
   are called serially.

So the reserved tags may still be enough while reg_xx() use reserved tags.</Note>
    </Notes>
    <CVE>CVE-2024-41082</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-41082.html</URL>
        <Description>CVE-2024-41082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228620</URL>
        <Description>SUSE Bug 1228620</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="53">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values

syzbot is able to trigger softlockups, setting NL80211_ATTR_TXQ_QUANTUM
to 2^31.

We had a similar issue in sch_fq, fixed with commit
d9e15a273306 ("pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM")

watchdog: BUG: soft lockup - CPU#1 stuck for 26s! [kworker/1:0:24]
Modules linked in:
irq event stamp: 131135
 hardirqs last  enabled at (131134): [&lt;ffff80008ae8778c&gt;] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:85 [inline]
 hardirqs last  enabled at (131134): [&lt;ffff80008ae8778c&gt;] exit_to_kernel_mode+0xdc/0x10c arch/arm64/kernel/entry-common.c:95
 hardirqs last disabled at (131135): [&lt;ffff80008ae85378&gt;] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline]
 hardirqs last disabled at (131135): [&lt;ffff80008ae85378&gt;] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:551
 softirqs last  enabled at (125892): [&lt;ffff80008907e82c&gt;] neigh_hh_init net/core/neighbour.c:1538 [inline]
 softirqs last  enabled at (125892): [&lt;ffff80008907e82c&gt;] neigh_resolve_output+0x268/0x658 net/core/neighbour.c:1553
 softirqs last disabled at (125896): [&lt;ffff80008904166c&gt;] local_bh_disable+0x10/0x34 include/linux/bottom_half.h:19
CPU: 1 PID: 24 Comm: kworker/1:0 Not tainted 6.9.0-rc7-syzkaller-gfda5695d692c #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Workqueue: mld mld_ifc_work
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : __list_del include/linux/list.h:195 [inline]
 pc : __list_del_entry include/linux/list.h:218 [inline]
 pc : list_move_tail include/linux/list.h:310 [inline]
 pc : fq_tin_dequeue include/net/fq_impl.h:112 [inline]
 pc : ieee80211_tx_dequeue+0x6b8/0x3b4c net/mac80211/tx.c:3854
 lr : __list_del_entry include/linux/list.h:218 [inline]
 lr : list_move_tail include/linux/list.h:310 [inline]
 lr : fq_tin_dequeue include/net/fq_impl.h:112 [inline]
 lr : ieee80211_tx_dequeue+0x67c/0x3b4c net/mac80211/tx.c:3854
sp : ffff800093d36700
x29: ffff800093d36a60 x28: ffff800093d36960 x27: dfff800000000000
x26: ffff0000d800ad50 x25: ffff0000d800abe0 x24: ffff0000d800abf0
x23: ffff0000e0032468 x22: ffff0000e00324d4 x21: ffff0000d800abf0
x20: ffff0000d800abf8 x19: ffff0000d800abf0 x18: ffff800093d363c0
x17: 000000000000d476 x16: ffff8000805519dc x15: ffff7000127a6cc8
x14: 1ffff000127a6cc8 x13: 0000000000000004 x12: ffffffffffffffff
x11: ffff7000127a6cc8 x10: 0000000000ff0100 x9 : 0000000000000000
x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000
x5 : ffff80009287aa08 x4 : 0000000000000008 x3 : ffff80008034c7fc
x2 : ffff0000e0032468 x1 : 00000000da0e46b8 x0 : ffff0000e0032470
Call trace:
  __list_del include/linux/list.h:195 [inline]
  __list_del_entry include/linux/list.h:218 [inline]
  list_move_tail include/linux/list.h:310 [inline]
  fq_tin_dequeue include/net/fq_impl.h:112 [inline]
  ieee80211_tx_dequeue+0x6b8/0x3b4c net/mac80211/tx.c:3854
  wake_tx_push_queue net/mac80211/util.c:294 [inline]
  ieee80211_handle_wake_tx_queue+0x118/0x274 net/mac80211/util.c:315
  drv_wake_tx_queue net/mac80211/driver-ops.h:1350 [inline]
  schedule_and_wake_txq net/mac80211/driver-ops.h:1357 [inline]
  ieee80211_queue_skb+0x18e8/0x2244 net/mac80211/tx.c:1664
  ieee80211_tx+0x260/0x400 net/mac80211/tx.c:1966
  ieee80211_xmit+0x278/0x354 net/mac80211/tx.c:2062
  __ieee80211_subif_start_xmit+0xab8/0x122c net/mac80211/tx.c:4338
  ieee80211_subif_start_xmit+0xe0/0x438 net/mac80211/tx.c:4532
  __netdev_start_xmit include/linux/netdevice.h:4903 [inline]
  netdev_start_xmit include/linux/netdevice.h:4917 [inline]
  xmit_one net/core/dev.c:3531 [inline]
  dev_hard_start_xmit+0x27c/0x938 net/core/dev.c:3547
  __dev_queue_xmit+0x1678/0x33fc net/core/dev.c:4341
  dev_queue_xmit include/linux/netdevice.h:3091 [inline]
  neigh_resolve_output+0x558/0x658 net/core/neighbour.c:1563
  neigh_output include/net/neighbour.h:542 [inline]
  ip6_fini
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-42114</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-42114.html</URL>
        <Description>CVE-2024-42114</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228564</URL>
        <Description>SUSE Bug 1228564</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="54">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

IB/core: Implement a limit on UMAD receive List

The existing behavior of ib_umad, which maintains received MAD
packets in an unbounded list, poses a risk of uncontrolled growth.
As user-space applications extract packets from this list, the rate
of extraction may not match the rate of incoming packets, leading
to potential list overflow.

To address this, we introduce a limit to the size of the list. After
considering typical scenarios, such as OpenSM processing, which can
handle approximately 100k packets per second, and the 1-second retry
timeout for most packets, we set the list size limit to 200k. Packets
received beyond this limit are dropped, assuming they are likely timed
out by the time they are handled by user-space.

Notably, packets queued on the receive list due to reasons like
timed-out sends are preserved even when the list is full.</Note>
    </Notes>
    <CVE>CVE-2024-42145</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-42145.html</URL>
        <Description>CVE-2024-42145</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223384</URL>
        <Description>SUSE Bug 1223384</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228743</URL>
        <Description>SUSE Bug 1228743</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228744</URL>
        <Description>SUSE Bug 1228744</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="55">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

gpio: pca953x: fix pca953x_irq_bus_sync_unlock race

Ensure that `i2c_lock' is held when setting interrupt latch and mask in
pca953x_irq_bus_sync_unlock() in order to avoid races.

The other (non-probe) call site pca953x_gpio_set_multiple() ensures the
lock is held before calling pca953x_write_regs().

The problem occurred when a request raced against irq_bus_sync_unlock()
approximately once per thousand reboots on an i.MX8MP based system.

 * Normal case

   0-0022: write register AI|3a {03,02,00,00,01} Input latch P0
   0-0022: write register AI|49 {fc,fd,ff,ff,fe} Interrupt mask P0
   0-0022: write register AI|08 {ff,00,00,00,00} Output P3
   0-0022: write register AI|12 {fc,00,00,00,00} Config P3

 * Race case

   0-0022: write register AI|08 {ff,00,00,00,00} Output P3
   0-0022: write register AI|08 {03,02,00,00,01} *** Wrong register ***
   0-0022: write register AI|12 {fc,00,00,00,00} Config P3
   0-0022: write register AI|49 {fc,fd,ff,ff,fe} Interrupt mask P0</Note>
    </Notes>
    <CVE>CVE-2024-42253</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-42253.html</URL>
        <Description>CVE-2024-42253</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1229005</URL>
        <Description>SUSE Bug 1229005</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="56">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

gpio: prevent potential speculation leaks in gpio_device_get_desc()

Userspace may trigger a speculative read of an address outside the gpio
descriptor array.
Users can do that by calling gpio_ioctl() with an offset out of range.
Offset is copied from user and then used as an array index to get
the gpio descriptor without sanitization in gpio_device_get_desc().

This change ensures that the offset is sanitized by using
array_index_nospec() to mitigate any possibility of speculative
information leaks.

This bug was discovered and resolved using Coverity Static Analysis
Security Testing (SAST) by Synopsys, Inc.</Note>
    </Notes>
    <CVE>CVE-2024-44931</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-44931.html</URL>
        <Description>CVE-2024-44931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1229837</URL>
        <Description>SUSE Bug 1229837</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="57">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

sched/smt: Fix unbalance sched_smt_present dec/inc

I got the following warn report while doing stress test:

jump label: negative count!
WARNING: CPU: 3 PID: 38 at kernel/jump_label.c:263 static_key_slow_try_dec+0x9d/0xb0
Call Trace:
 &lt;TASK&gt;
 __static_key_slow_dec_cpuslocked+0x16/0x70
 sched_cpu_deactivate+0x26e/0x2a0
 cpuhp_invoke_callback+0x3ad/0x10d0
 cpuhp_thread_fun+0x3f5/0x680
 smpboot_thread_fn+0x56d/0x8d0
 kthread+0x309/0x400
 ret_from_fork+0x41/0x70
 ret_from_fork_asm+0x1b/0x30
 &lt;/TASK&gt;

Because when cpuset_cpu_inactive() fails in sched_cpu_deactivate(),
the cpu offline failed, but sched_smt_present is decremented before
calling sched_cpu_deactivate(), it leads to unbalanced dec/inc, so
fix it by incrementing sched_smt_present in the error path.</Note>
    </Notes>
    <CVE>CVE-2024-44958</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-44958.html</URL>
        <Description>CVE-2024-44958</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230179</URL>
        <Description>SUSE Bug 1230179</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="58">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number

Check the fb_channel_number range to avoid the array out-of-bounds
read error</Note>
    </Notes>
    <CVE>CVE-2024-46724</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46724.html</URL>
        <Description>CVE-2024-46724</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230725</URL>
        <Description>SUSE Bug 1230725</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="59">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id()

mwifiex_get_priv_by_id() returns the priv pointer corresponding to
the bss_num and bss_type, but without checking if the priv is actually
currently in use.
Unused priv pointers do not have a wiphy attached to them which can
lead to NULL pointer dereferences further down the callstack.  Fix
this by returning only used priv pointers which have priv-&gt;bss_mode
set to something else than NL80211_IFTYPE_UNSPECIFIED.

Said NULL pointer dereference happened when an Accesspoint was started
with wpa_supplicant -i mlan0 with this config:

network={
        ssid="somessid"
        mode=2
        frequency=2412
        key_mgmt=WPA-PSK WPA-PSK-SHA256
        proto=RSN
        group=CCMP
        pairwise=CCMP
        psk="12345678"
}

When waiting for the AP to be established, interrupting wpa_supplicant
with &lt;ctrl-c&gt; and starting it again this happens:

| Unable to handle kernel NULL pointer dereference at virtual address 0000000000000140
| Mem abort info:
|   ESR = 0x0000000096000004
|   EC = 0x25: DABT (current EL), IL = 32 bits
|   SET = 0, FnV = 0
|   EA = 0, S1PTW = 0
|   FSC = 0x04: level 0 translation fault
| Data abort info:
|   ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
|   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
|   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
| user pgtable: 4k pages, 48-bit VAs, pgdp=0000000046d96000
| [0000000000000140] pgd=0000000000000000, p4d=0000000000000000
| Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
| Modules linked in: caam_jr caamhash_desc spidev caamalg_desc crypto_engine authenc libdes mwifiex_sdio
+mwifiex crct10dif_ce cdc_acm onboard_usb_hub fsl_imx8_ddr_perf imx8m_ddrc rtc_ds1307 lm75 rtc_snvs
+imx_sdma caam imx8mm_thermal spi_imx error imx_cpufreq_dt fuse ip_tables x_tables ipv6
| CPU: 0 PID: 8 Comm: kworker/0:1 Not tainted 6.9.0-00007-g937242013fce-dirty #18
| Hardware name: somemachine (DT)
| Workqueue: events sdio_irq_work
| pstate: 00000005 (nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
| pc : mwifiex_get_cfp+0xd8/0x15c [mwifiex]
| lr : mwifiex_get_cfp+0x34/0x15c [mwifiex]
| sp : ffff8000818b3a70
| x29: ffff8000818b3a70 x28: ffff000006bfd8a5 x27: 0000000000000004
| x26: 000000000000002c x25: 0000000000001511 x24: 0000000002e86bc9
| x23: ffff000006bfd996 x22: 0000000000000004 x21: ffff000007bec000
| x20: 000000000000002c x19: 0000000000000000 x18: 0000000000000000
| x17: 000000040044ffff x16: 00500072b5503510 x15: ccc283740681e517
| x14: 0201000101006d15 x13: 0000000002e8ff43 x12: 002c01000000ffb1
| x11: 0100000000000000 x10: 02e8ff43002c0100 x9 : 0000ffb100100157
| x8 : ffff000003d20000 x7 : 00000000000002f1 x6 : 00000000ffffe124
| x5 : 0000000000000001 x4 : 0000000000000003 x3 : 0000000000000000
| x2 : 0000000000000000 x1 : 0001000000011001 x0 : 0000000000000000
| Call trace:
|  mwifiex_get_cfp+0xd8/0x15c [mwifiex]
|  mwifiex_parse_single_response_buf+0x1d0/0x504 [mwifiex]
|  mwifiex_handle_event_ext_scan_report+0x19c/0x2f8 [mwifiex]
|  mwifiex_process_sta_event+0x298/0xf0c [mwifiex]
|  mwifiex_process_event+0x110/0x238 [mwifiex]
|  mwifiex_main_process+0x428/0xa44 [mwifiex]
|  mwifiex_sdio_interrupt+0x64/0x12c [mwifiex_sdio]
|  process_sdio_pending_irqs+0x64/0x1b8
|  sdio_irq_work+0x4c/0x7c
|  process_one_work+0x148/0x2a0
|  worker_thread+0x2fc/0x40c
|  kthread+0x110/0x114
|  ret_from_fork+0x10/0x20
| Code: a94153f3 a8c37bfd d50323bf d65f03c0 (f940a000)
| ---[ end trace 0000000000000000 ]---</Note>
    </Notes>
    <CVE>CVE-2024-46755</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46755.html</URL>
        <Description>CVE-2024-46755</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230802</URL>
        <Description>SUSE Bug 1230802</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="60">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: added NULL check at start of dc_validate_stream

[Why]
prevent invalid memory access

[How]
check if dc and stream are NULL</Note>
    </Notes>
    <CVE>CVE-2024-46802</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46802.html</URL>
        <Description>CVE-2024-46802</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231111</URL>
        <Description>SUSE Bug 1231111</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="61">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check BIOS images before it is used

BIOS images may fail to load and null checks are added before they are
used.

This fixes 6 NULL_RETURNS issues reported by Coverity.</Note>
    </Notes>
    <CVE>CVE-2024-46809</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46809.html</URL>
        <Description>CVE-2024-46809</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231148</URL>
        <Description>SUSE Bug 1231148</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="62">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check link_index before accessing dc-&gt;links[]

[WHY &amp; HOW]
dc-&gt;links[] has max size of MAX_LINKS and NULL is return when trying to
access with out-of-bound index.

This fixes 3 OVERRUN and 1 RESOURCE_LEAK issues reported by Coverity.</Note>
    </Notes>
    <CVE>CVE-2024-46813</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46813.html</URL>
        <Description>CVE-2024-46813</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231191</URL>
        <Description>SUSE Bug 1231191</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231192</URL>
        <Description>SUSE Bug 1231192</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="63">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links

[Why]
Coverity report OVERRUN warning. There are
only max_links elements within dc-&gt;links. link
count could up to AMDGPU_DM_MAX_DISPLAY_INDEX 31.

[How]
Make sure link count less than max_links.</Note>
    </Notes>
    <CVE>CVE-2024-46816</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46816.html</URL>
        <Description>CVE-2024-46816</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231197</URL>
        <Description>SUSE Bug 1231197</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231198</URL>
        <Description>SUSE Bug 1231198</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="64">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check gpio_id before used as array index

[WHY &amp; HOW]
GPIO_ID_UNKNOWN (-1) is not a valid value for array index and therefore
should be checked in advance.

This fixes 5 OVERRUN issues reported by Coverity.</Note>
    </Notes>
    <CVE>CVE-2024-46818</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46818.html</URL>
        <Description>CVE-2024-46818</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231203</URL>
        <Description>SUSE Bug 1231203</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231204</URL>
        <Description>SUSE Bug 1231204</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="65">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ELF: fix kernel.randomize_va_space double read

ELF loader uses "randomize_va_space" twice. It is sysctl and can change
at any moment, so 2 loads could see 2 different values in theory with
unpredictable consequences.

Issue exactly one load for consistent value across one exec.</Note>
    </Notes>
    <CVE>CVE-2024-46826</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46826.html</URL>
        <Description>CVE-2024-46826</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231115</URL>
        <Description>SUSE Bug 1231115</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="66">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ethtool: fail closed if we can't get max channel used in indirection tables

Commit 0d1b7d6c9274 ("bnxt: fix crashes when reducing ring count with
active RSS contexts") proves that allowing indirection table to contain
channels with out of bounds IDs may lead to crashes. Currently the
max channel check in the core gets skipped if driver can't fetch
the indirection table or when we can't allocate memory.

Both of those conditions should be extremely rare but if they do
happen we should try to be safe and fail the channel change.</Note>
    </Notes>
    <CVE>CVE-2024-46834</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46834.html</URL>
        <Description>CVE-2024-46834</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231096</URL>
        <Description>SUSE Bug 1231096</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="67">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

btrfs: clean up our handling of refs == 0 in snapshot delete

In reada we BUG_ON(refs == 0), which could be unkind since we aren't
holding a lock on the extent leaf and thus could get a transient
incorrect answer.  In walk_down_proc we also BUG_ON(refs == 0), which
could happen if we have extent tree corruption.  Change that to return
-EUCLEAN.  In do_walk_down() we catch this case and handle it correctly,
however we return -EIO, which -EUCLEAN is a more appropriate error code.
Finally in walk_up_proc we have the same BUG_ON(refs == 0), so convert
that to proper error handling.  Also adjust the error message so we can
actually do something with the information.</Note>
    </Notes>
    <CVE>CVE-2024-46840</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46840.html</URL>
        <Description>CVE-2024-46840</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231105</URL>
        <Description>SUSE Bug 1231105</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="68">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

btrfs: don't BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc()

We handle errors here properly, ENOMEM isn't fatal, return the error.</Note>
    </Notes>
    <CVE>CVE-2024-46841</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46841.html</URL>
        <Description>CVE-2024-46841</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231094</URL>
        <Description>SUSE Bug 1231094</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="69">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

perf/x86/intel: Limit the period on Haswell

Running the ltp test cve-2015-3290 concurrently reports the following
warnings.

perfevents: irq loop stuck!
  WARNING: CPU: 31 PID: 32438 at arch/x86/events/intel/core.c:3174
  intel_pmu_handle_irq+0x285/0x370
  Call Trace:
   &lt;NMI&gt;
   ? __warn+0xa4/0x220
   ? intel_pmu_handle_irq+0x285/0x370
   ? __report_bug+0x123/0x130
   ? intel_pmu_handle_irq+0x285/0x370
   ? __report_bug+0x123/0x130
   ? intel_pmu_handle_irq+0x285/0x370
   ? report_bug+0x3e/0xa0
   ? handle_bug+0x3c/0x70
   ? exc_invalid_op+0x18/0x50
   ? asm_exc_invalid_op+0x1a/0x20
   ? irq_work_claim+0x1e/0x40
   ? intel_pmu_handle_irq+0x285/0x370
   perf_event_nmi_handler+0x3d/0x60
   nmi_handle+0x104/0x330

Thanks to Thomas Gleixner's analysis, the issue is caused by the low
initial period (1) of the frequency estimation algorithm, which triggers
the defects of the HW, specifically erratum HSW11 and HSW143. (For the
details, please refer https://lore.kernel.org/lkml/87plq9l5d2.ffs@tglx/)

The HSW11 requires a period larger than 100 for the INST_RETIRED.ALL
event, but the initial period in the freq mode is 1. The erratum is the
same as the BDM11, which has been supported in the kernel. A minimum
period of 128 is enforced as well on HSW.

HSW143 is regarding that the fixed counter 1 may overcount 32 with the
Hyper-Threading is enabled. However, based on the test, the hardware
has more issues than it tells. Besides the fixed counter 1, the message
'interrupt took too long' can be observed on any counter which was armed
with a period &lt; 32 and two events expired in the same NMI. A minimum
period of 32 is enforced for the rest of the events.
The recommended workaround code of the HSW143 is not implemented.
Because it only addresses the issue for the fixed counter. It brings
extra overhead through extra MSR writing. No related overcounting issue
has been reported so far.</Note>
    </Notes>
    <CVE>CVE-2024-46848</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46848.html</URL>
        <Description>CVE-2024-46848</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231072</URL>
        <Description>SUSE Bug 1231072</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="70">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ocfs2: add bounds checking to ocfs2_xattr_find_entry()

Add a paranoia check to make sure it doesn't stray beyond valid memory
region containing ocfs2 xattr entries when scanning for a match.  It will
prevent out-of-bound access in case of crafted images.</Note>
    </Notes>
    <CVE>CVE-2024-47670</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47670.html</URL>
        <Description>CVE-2024-47670</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231537</URL>
        <Description>SUSE Bug 1231537</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="71">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: don't wait for tx queues if firmware is dead

There is a WARNING in iwl_trans_wait_tx_queues_empty() (that was
recently converted from just a message), that can be hit if we
wait for TX queues to become empty after firmware died. Clearly,
we can't expect anything from the firmware after it's declared dead.

Don't call iwl_trans_wait_tx_queues_empty() in this case. While it could
be a good idea to stop the flow earlier, the flush functions do some
maintenance work that is not related to the firmware, so keep that part
of the code running even when the firmware is not running.

[edit commit message]</Note>
    </Notes>
    <CVE>CVE-2024-47672</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47672.html</URL>
        <Description>CVE-2024-47672</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231540</URL>
        <Description>SUSE Bug 1231540</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="72">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: pause TCM when the firmware is stopped

Not doing so will make us send a host command to the transport while the
firmware is not alive, which will trigger a WARNING.

bad state = 0
WARNING: CPU: 2 PID: 17434 at drivers/net/wireless/intel/iwlwifi/iwl-trans.c:115 iwl_trans_send_cmd+0x1cb/0x1e0 [iwlwifi]
RIP: 0010:iwl_trans_send_cmd+0x1cb/0x1e0 [iwlwifi]
Call Trace:
 &lt;TASK&gt;
 iwl_mvm_send_cmd+0x40/0xc0 [iwlmvm]
 iwl_mvm_config_scan+0x198/0x260 [iwlmvm]
 iwl_mvm_recalc_tcm+0x730/0x11d0 [iwlmvm]
 iwl_mvm_tcm_work+0x1d/0x30 [iwlmvm]
 process_one_work+0x29e/0x640
 worker_thread+0x2df/0x690
 ? rescuer_thread+0x540/0x540
 kthread+0x192/0x1e0
 ? set_kthread_struct+0x90/0x90
 ret_from_fork+0x22/0x30</Note>
    </Notes>
    <CVE>CVE-2024-47673</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47673.html</URL>
        <Description>CVE-2024-47673</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231539</URL>
        <Description>SUSE Bug 1231539</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="73">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mm: avoid leaving partial pfn mappings around in error case

As Jann points out, PFN mappings are special, because unlike normal
memory mappings, there is no lifetime information associated with the
mapping - it is just a raw mapping of PFNs with no reference counting of
a 'struct page'.

That's all very much intentional, but it does mean that it's easy to
mess up the cleanup in case of errors.  Yes, a failed mmap() will always
eventually clean up any partial mappings, but without any explicit
lifetime in the page table mapping itself, it's very easy to do the
error handling in the wrong order.

In particular, it's easy to mistakenly free the physical backing store
before the page tables are actually cleaned up and (temporarily) have
stale dangling PTE entries.

To make this situation less error-prone, just make sure that any partial
pfn mapping is torn down early, before any other error handling.</Note>
    </Notes>
    <CVE>CVE-2024-47674</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47674.html</URL>
        <Description>CVE-2024-47674</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231673</URL>
        <Description>SUSE Bug 1231673</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231676</URL>
        <Description>SUSE Bug 1231676</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="74">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tcp: check skb is non-NULL in tcp_rto_delta_us()

We have some machines running stock Ubuntu 20.04.6 which is their 5.4.0-174-generic
kernel that are running ceph and recently hit a null ptr dereference in
tcp_rearm_rto(). Initially hitting it from the TLP path, but then later we also
saw it getting hit from the RACK case as well. Here are examples of the oops
messages we saw in each of those cases:

Jul 26 15:05:02 rx [11061395.780353] BUG: kernel NULL pointer dereference, address: 0000000000000020
Jul 26 15:05:02 rx [11061395.787572] #PF: supervisor read access in kernel mode
Jul 26 15:05:02 rx [11061395.792971] #PF: error_code(0x0000) - not-present page
Jul 26 15:05:02 rx [11061395.798362] PGD 0 P4D 0
Jul 26 15:05:02 rx [11061395.801164] Oops: 0000 [#1] SMP NOPTI
Jul 26 15:05:02 rx [11061395.805091] CPU: 0 PID: 9180 Comm: msgr-worker-1 Tainted: G W 5.4.0-174-generic #193-Ubuntu
Jul 26 15:05:02 rx [11061395.814996] Hardware name: Supermicro SMC 2x26 os-gen8 64C NVME-Y 256G/H12SSW-NTR, BIOS 2.5.V1.2U.NVMe.UEFI 05/09/2023
Jul 26 15:05:02 rx [11061395.825952] RIP: 0010:tcp_rearm_rto+0xe4/0x160
Jul 26 15:05:02 rx [11061395.830656] Code: 87 ca 04 00 00 00 5b 41 5c 41 5d 5d c3 c3 49 8b bc 24 40 06 00 00 eb 8d 48 bb cf f7 53 e3 a5 9b c4 20 4c 89 ef e8 0c fe 0e 00 &lt;48&gt; 8b 78 20 48 c1 ef 03 48 89 f8 41 8b bc 24 80 04 00 00 48 f7 e3
Jul 26 15:05:02 rx [11061395.849665] RSP: 0018:ffffb75d40003e08 EFLAGS: 00010246
Jul 26 15:05:02 rx [11061395.855149] RAX: 0000000000000000 RBX: 20c49ba5e353f7cf RCX: 0000000000000000
Jul 26 15:05:02 rx [11061395.862542] RDX: 0000000062177c30 RSI: 000000000000231c RDI: ffff9874ad283a60
Jul 26 15:05:02 rx [11061395.869933] RBP: ffffb75d40003e20 R08: 0000000000000000 R09: ffff987605e20aa8
Jul 26 15:05:02 rx [11061395.877318] R10: ffffb75d40003f00 R11: ffffb75d4460f740 R12: ffff9874ad283900
Jul 26 15:05:02 rx [11061395.884710] R13: ffff9874ad283a60 R14: ffff9874ad283980 R15: ffff9874ad283d30
Jul 26 15:05:02 rx [11061395.892095] FS: 00007f1ef4a2e700(0000) GS:ffff987605e00000(0000) knlGS:0000000000000000
Jul 26 15:05:02 rx [11061395.900438] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jul 26 15:05:02 rx [11061395.906435] CR2: 0000000000000020 CR3: 0000003e450ba003 CR4: 0000000000760ef0
Jul 26 15:05:02 rx [11061395.913822] PKRU: 55555554
Jul 26 15:05:02 rx [11061395.916786] Call Trace:
Jul 26 15:05:02 rx [11061395.919488]
Jul 26 15:05:02 rx [11061395.921765] ? show_regs.cold+0x1a/0x1f
Jul 26 15:05:02 rx [11061395.925859] ? __die+0x90/0xd9
Jul 26 15:05:02 rx [11061395.929169] ? no_context+0x196/0x380
Jul 26 15:05:02 rx [11061395.933088] ? ip6_protocol_deliver_rcu+0x4e0/0x4e0
Jul 26 15:05:02 rx [11061395.938216] ? ip6_sublist_rcv_finish+0x3d/0x50
Jul 26 15:05:02 rx [11061395.943000] ? __bad_area_nosemaphore+0x50/0x1a0
Jul 26 15:05:02 rx [11061395.947873] ? bad_area_nosemaphore+0x16/0x20
Jul 26 15:05:02 rx [11061395.952486] ? do_user_addr_fault+0x267/0x450
Jul 26 15:05:02 rx [11061395.957104] ? ipv6_list_rcv+0x112/0x140
Jul 26 15:05:02 rx [11061395.961279] ? __do_page_fault+0x58/0x90
Jul 26 15:05:02 rx [11061395.965458] ? do_page_fault+0x2c/0xe0
Jul 26 15:05:02 rx [11061395.969465] ? page_fault+0x34/0x40
Jul 26 15:05:02 rx [11061395.973217] ? tcp_rearm_rto+0xe4/0x160
Jul 26 15:05:02 rx [11061395.977313] ? tcp_rearm_rto+0xe4/0x160
Jul 26 15:05:02 rx [11061395.981408] tcp_send_loss_probe+0x10b/0x220
Jul 26 15:05:02 rx [11061395.985937] tcp_write_timer_handler+0x1b4/0x240
Jul 26 15:05:02 rx [11061395.990809] tcp_write_timer+0x9e/0xe0
Jul 26 15:05:02 rx [11061395.994814] ? tcp_write_timer_handler+0x240/0x240
Jul 26 15:05:02 rx [11061395.999866] call_timer_fn+0x32/0x130
Jul 26 15:05:02 rx [11061396.003782] __run_timers.part.0+0x180/0x280
Jul 26 15:05:02 rx [11061396.008309] ? recalibrate_cpu_khz+0x10/0x10
Jul 26 15:05:02 rx [11061396.012841] ? native_x2apic_icr_write+0x30/0x30
Jul 26 15:05:02 rx [11061396.017718] ? lapic_next_even
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-47684</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47684.html</URL>
        <Description>CVE-2024-47684</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231987</URL>
        <Description>SUSE Bug 1231987</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231993</URL>
        <Description>SUSE Bug 1231993</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="75">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()

syzbot reported that nf_reject_ip6_tcphdr_put() was possibly sending
garbage on the four reserved tcp bits (th-&gt;res1)

Use skb_put_zero() to clear the whole TCP header,
as done in nf_reject_ip_tcphdr_put()

BUG: KMSAN: uninit-value in nf_reject_ip6_tcphdr_put+0x688/0x6c0 net/ipv6/netfilter/nf_reject_ipv6.c:255
  nf_reject_ip6_tcphdr_put+0x688/0x6c0 net/ipv6/netfilter/nf_reject_ipv6.c:255
  nf_send_reset6+0xd84/0x15b0 net/ipv6/netfilter/nf_reject_ipv6.c:344
  nft_reject_inet_eval+0x3c1/0x880 net/netfilter/nft_reject_inet.c:48
  expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]
  nft_do_chain+0x438/0x22a0 net/netfilter/nf_tables_core.c:288
  nft_do_chain_inet+0x41a/0x4f0 net/netfilter/nft_chain_filter.c:161
  nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
  nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626
  nf_hook include/linux/netfilter.h:269 [inline]
  NF_HOOK include/linux/netfilter.h:312 [inline]
  ipv6_rcv+0x29b/0x390 net/ipv6/ip6_input.c:310
  __netif_receive_skb_one_core net/core/dev.c:5661 [inline]
  __netif_receive_skb+0x1da/0xa00 net/core/dev.c:5775
  process_backlog+0x4ad/0xa50 net/core/dev.c:6108
  __napi_poll+0xe7/0x980 net/core/dev.c:6772
  napi_poll net/core/dev.c:6841 [inline]
  net_rx_action+0xa5a/0x19b0 net/core/dev.c:6963
  handle_softirqs+0x1ce/0x800 kernel/softirq.c:554
  __do_softirq+0x14/0x1a kernel/softirq.c:588
  do_softirq+0x9a/0x100 kernel/softirq.c:455
  __local_bh_enable_ip+0x9f/0xb0 kernel/softirq.c:382
  local_bh_enable include/linux/bottom_half.h:33 [inline]
  rcu_read_unlock_bh include/linux/rcupdate.h:908 [inline]
  __dev_queue_xmit+0x2692/0x5610 net/core/dev.c:4450
  dev_queue_xmit include/linux/netdevice.h:3105 [inline]
  neigh_resolve_output+0x9ca/0xae0 net/core/neighbour.c:1565
  neigh_output include/net/neighbour.h:542 [inline]
  ip6_finish_output2+0x2347/0x2ba0 net/ipv6/ip6_output.c:141
  __ip6_finish_output net/ipv6/ip6_output.c:215 [inline]
  ip6_finish_output+0xbb8/0x14b0 net/ipv6/ip6_output.c:226
  NF_HOOK_COND include/linux/netfilter.h:303 [inline]
  ip6_output+0x356/0x620 net/ipv6/ip6_output.c:247
  dst_output include/net/dst.h:450 [inline]
  NF_HOOK include/linux/netfilter.h:314 [inline]
  ip6_xmit+0x1ba6/0x25d0 net/ipv6/ip6_output.c:366
  inet6_csk_xmit+0x442/0x530 net/ipv6/inet6_connection_sock.c:135
  __tcp_transmit_skb+0x3b07/0x4880 net/ipv4/tcp_output.c:1466
  tcp_transmit_skb net/ipv4/tcp_output.c:1484 [inline]
  tcp_connect+0x35b6/0x7130 net/ipv4/tcp_output.c:4143
  tcp_v6_connect+0x1bcc/0x1e40 net/ipv6/tcp_ipv6.c:333
  __inet_stream_connect+0x2ef/0x1730 net/ipv4/af_inet.c:679
  inet_stream_connect+0x6a/0xd0 net/ipv4/af_inet.c:750
  __sys_connect_file net/socket.c:2061 [inline]
  __sys_connect+0x606/0x690 net/socket.c:2078
  __do_sys_connect net/socket.c:2088 [inline]
  __se_sys_connect net/socket.c:2085 [inline]
  __x64_sys_connect+0x91/0xe0 net/socket.c:2085
  x64_sys_call+0x27a5/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:43
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Uninit was stored to memory at:
  nf_reject_ip6_tcphdr_put+0x60c/0x6c0 net/ipv6/netfilter/nf_reject_ipv6.c:249
  nf_send_reset6+0xd84/0x15b0 net/ipv6/netfilter/nf_reject_ipv6.c:344
  nft_reject_inet_eval+0x3c1/0x880 net/netfilter/nft_reject_inet.c:48
  expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]
  nft_do_chain+0x438/0x22a0 net/netfilter/nf_tables_core.c:288
  nft_do_chain_inet+0x41a/0x4f0 net/netfilter/nft_chain_filter.c:161
  nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
  nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626
  nf_hook include/linux/netfilter.h:269 [inline]
  NF_HOOK include/linux/netfilter.h:312 [inline]
  ipv6_rcv+0x29b/0x390 net/ipv6/ip6_input.c:310
  __netif_receive_skb_one_core
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-47685</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47685.html</URL>
        <Description>CVE-2024-47685</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231998</URL>
        <Description>SUSE Bug 1231998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="76">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency

In the commit aee2424246f9 ("RDMA/iwcm: Fix a use-after-free related to
destroying CM IDs"), the function flush_workqueue is invoked to flush the
work queue iwcm_wq.

But at that time, the work queue iwcm_wq was created via the function
alloc_ordered_workqueue without the flag WQ_MEM_RECLAIM.

Because the current process is trying to flush the whole iwcm_wq, if
iwcm_wq doesn't have the flag WQ_MEM_RECLAIM, verify that the current
process is not reclaiming memory or running on a workqueue which doesn't
have the flag WQ_MEM_RECLAIM as that can break forward-progress guarantee
leading to a deadlock.

The call trace is as below:

[  125.350876][ T1430] Call Trace:
[  125.356281][ T1430]  &lt;TASK&gt;
[ 125.361285][ T1430] ? __warn (kernel/panic.c:693)
[ 125.367640][ T1430] ? check_flush_dependency (kernel/workqueue.c:3706 (discriminator 9))
[ 125.375689][ T1430] ? report_bug (lib/bug.c:180 lib/bug.c:219)
[ 125.382505][ T1430] ? handle_bug (arch/x86/kernel/traps.c:239)
[ 125.388987][ T1430] ? exc_invalid_op (arch/x86/kernel/traps.c:260 (discriminator 1))
[ 125.395831][ T1430] ? asm_exc_invalid_op (arch/x86/include/asm/idtentry.h:621)
[ 125.403125][ T1430] ? check_flush_dependency (kernel/workqueue.c:3706 (discriminator 9))
[ 125.410984][ T1430] ? check_flush_dependency (kernel/workqueue.c:3706 (discriminator 9))
[ 125.418764][ T1430] __flush_workqueue (kernel/workqueue.c:3970)
[ 125.426021][ T1430] ? __pfx___might_resched (kernel/sched/core.c:10151)
[ 125.433431][ T1430] ? destroy_cm_id (drivers/infiniband/core/iwcm.c:375) iw_cm
[ 125.441209][ T1430] ? __pfx___flush_workqueue (kernel/workqueue.c:3910)
[ 125.473900][ T1430] ? _raw_spin_lock_irqsave (arch/x86/include/asm/atomic.h:107 include/linux/atomic/atomic-arch-fallback.h:2170 include/linux/atomic/atomic-instrumented.h:1302 include/asm-generic/qspinlock.h:111 include/linux/spinlock.h:187 include/linux/spinlock_api_smp.h:111 kernel/locking/spinlock.c:162)
[ 125.473909][ T1430] ? __pfx__raw_spin_lock_irqsave (kernel/locking/spinlock.c:161)
[ 125.482537][ T1430] _destroy_id (drivers/infiniband/core/cma.c:2044) rdma_cm
[ 125.495072][ T1430] nvme_rdma_free_queue (drivers/nvme/host/rdma.c:656 drivers/nvme/host/rdma.c:650) nvme_rdma
[ 125.505827][ T1430] nvme_rdma_reset_ctrl_work (drivers/nvme/host/rdma.c:2180) nvme_rdma
[ 125.505831][ T1430] process_one_work (kernel/workqueue.c:3231)
[ 125.515122][ T1430] worker_thread (kernel/workqueue.c:3306 kernel/workqueue.c:3393)
[ 125.515127][ T1430] ? __pfx_worker_thread (kernel/workqueue.c:3339)
[ 125.531837][ T1430] kthread (kernel/kthread.c:389)
[ 125.539864][ T1430] ? __pfx_kthread (kernel/kthread.c:342)
[ 125.550628][ T1430] ret_from_fork (arch/x86/kernel/process.c:147)
[ 125.558840][ T1430] ? __pfx_kthread (kernel/kthread.c:342)
[ 125.558844][ T1430] ret_from_fork_asm (arch/x86/entry/entry_64.S:257)
[  125.566487][ T1430]  &lt;/TASK&gt;
[  125.566488][ T1430] ---[ end trace 0000000000000000 ]---</Note>
    </Notes>
    <CVE>CVE-2024-47696</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47696.html</URL>
        <Description>CVE-2024-47696</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231864</URL>
        <Description>SUSE Bug 1231864</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="77">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error

Ensure index in rtl2830_pid_filter does not exceed 31 to prevent
out-of-bounds access.

dev-&gt;filters is a 32-bit value, so set_bit and clear_bit functions should
only operate on indices from 0 to 31. If index is 32, it will attempt to
access a non-existent 33rd bit, leading to out-of-bounds access.
Change the boundary check from index &gt; 32 to index &gt;= 32 to resolve this
issue.</Note>
    </Notes>
    <CVE>CVE-2024-47697</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47697.html</URL>
        <Description>CVE-2024-47697</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231858</URL>
        <Description>SUSE Bug 1231858</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="78">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error

Ensure index in rtl2832_pid_filter does not exceed 31 to prevent
out-of-bounds access.

dev-&gt;filters is a 32-bit value, so set_bit and clear_bit functions should
only operate on indices from 0 to 31. If index is 32, it will attempt to
access a non-existent 33rd bit, leading to out-of-bounds access.
Change the boundary check from index &gt; 32 to index &gt;= 32 to resolve this
issue.

[hverkuil: added fixes tag, rtl2830_pid_filter -&gt; rtl2832_pid_filter in logmsg]</Note>
    </Notes>
    <CVE>CVE-2024-47698</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47698.html</URL>
        <Description>CVE-2024-47698</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231859</URL>
        <Description>SUSE Bug 1231859</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="79">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

block, bfq: fix possible UAF for bfqq-&gt;bic with merge chain

1) initial state, three tasks:

		Process 1       Process 2	Process 3
		 (BIC1)          (BIC2)		 (BIC3)
		  |  Λ            |  Λ		  |  Λ
		  |  |            |  |		  |  |
		  V  |            V  |		  V  |
		  bfqq1           bfqq2		  bfqq3
process ref:	   1		    1		    1

2) bfqq1 merged to bfqq2:

		Process 1       Process 2	Process 3
		 (BIC1)          (BIC2)		 (BIC3)
		  |               |		  |  Λ
		  \--------------\|		  |  |
		                  V		  V  |
		  bfqq1---------&gt;bfqq2		  bfqq3
process ref:	   0		    2		    1

3) bfqq2 merged to bfqq3:

		Process 1       Process 2	Process 3
		 (BIC1)          (BIC2)		 (BIC3)
	 here -&gt; Λ                |		  |
		  \--------------\ \-------------\|
		                  V		  V
		  bfqq1---------&gt;bfqq2----------&gt;bfqq3
process ref:	   0		    1		    3

In this case, IO from Process 1 will get bfqq2 from BIC1 first, and then
get bfqq3 through merge chain, and finially handle IO by bfqq3.
Howerver, current code will think bfqq2 is owned by BIC1, like initial
state, and set bfqq2-&gt;bic to BIC1.

bfq_insert_request
-&gt; by Process 1
 bfqq = bfq_init_rq(rq)
  bfqq = bfq_get_bfqq_handle_split
   bfqq = bic_to_bfqq
   -&gt; get bfqq2 from BIC1
 bfqq-&gt;ref++
 rq-&gt;elv.priv[0] = bic
 rq-&gt;elv.priv[1] = bfqq
 if (bfqq_process_refs(bfqq) == 1)
  bfqq-&gt;bic = bic
  -&gt; record BIC1 to bfqq2

  __bfq_insert_request
   new_bfqq = bfq_setup_cooperator
   -&gt; get bfqq3 from bfqq2-&gt;new_bfqq
   bfqq_request_freed(bfqq)
   new_bfqq-&gt;ref++
   rq-&gt;elv.priv[1] = new_bfqq
   -&gt; handle IO by bfqq3

Fix the problem by checking bfqq is from merge chain fist. And this
might fix a following problem reported by our syzkaller(unreproducible):

==================================================================
BUG: KASAN: slab-use-after-free in bfq_do_early_stable_merge block/bfq-iosched.c:5692 [inline]
BUG: KASAN: slab-use-after-free in bfq_do_or_sched_stable_merge block/bfq-iosched.c:5805 [inline]
BUG: KASAN: slab-use-after-free in bfq_get_queue+0x25b0/0x2610 block/bfq-iosched.c:5889
Write of size 1 at addr ffff888123839eb8 by task kworker/0:1H/18595

CPU: 0 PID: 18595 Comm: kworker/0:1H Tainted: G             L     6.6.0-07439-gba2303cacfda #6
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
Workqueue: kblockd blk_mq_requeue_work
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x91/0xf0 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:364 [inline]
 print_report+0x10d/0x610 mm/kasan/report.c:475
 kasan_report+0x8e/0xc0 mm/kasan/report.c:588
 bfq_do_early_stable_merge block/bfq-iosched.c:5692 [inline]
 bfq_do_or_sched_stable_merge block/bfq-iosched.c:5805 [inline]
 bfq_get_queue+0x25b0/0x2610 block/bfq-iosched.c:5889
 bfq_get_bfqq_handle_split+0x169/0x5d0 block/bfq-iosched.c:6757
 bfq_init_rq block/bfq-iosched.c:6876 [inline]
 bfq_insert_request block/bfq-iosched.c:6254 [inline]
 bfq_insert_requests+0x1112/0x5cf0 block/bfq-iosched.c:6304
 blk_mq_insert_request+0x290/0x8d0 block/blk-mq.c:2593
 blk_mq_requeue_work+0x6bc/0xa70 block/blk-mq.c:1502
 process_one_work kernel/workqueue.c:2627 [inline]
 process_scheduled_works+0x432/0x13f0 kernel/workqueue.c:2700
 worker_thread+0x6f2/0x1160 kernel/workqueue.c:2781
 kthread+0x33c/0x440 kernel/kthread.c:388
 ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1b/0x30 arch/x86/entry/entry_64.S:305
 &lt;/TASK&gt;

Allocated by task 20776:
 kasan_save_stack+0x20/0x40 mm/kasan/common.c:45
 kasan_set_track+0x25/0x30 mm/kasan/common.c:52
 __kasan_slab_alloc+0x87/0x90 mm/kasan/common.c:328
 kasan_slab_alloc include/linux/kasan.h:188 [inline]
 slab_post_alloc_hook mm/slab.h:763 [inline]
 slab_alloc_node mm/slub.c:3458 [inline]
 kmem_cache_alloc_node+0x1a4/0x6f0 mm/slub.c:3503
 ioc_create_icq block/blk-ioc.c:370 [inline]
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-47706</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47706.html</URL>
        <Description>CVE-2024-47706</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231942</URL>
        <Description>SUSE Bug 1231942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231943</URL>
        <Description>SUSE Bug 1231943</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="80">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev()

Blamed commit accidentally removed a check for rt-&gt;rt6i_idev being NULL,
as spotted by syzbot:

Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
CPU: 1 UID: 0 PID: 10998 Comm: syz-executor Not tainted 6.11.0-rc6-syzkaller-00208-g625403177711 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
 RIP: 0010:rt6_uncached_list_flush_dev net/ipv6/route.c:177 [inline]
 RIP: 0010:rt6_disable_ip+0x33e/0x7e0 net/ipv6/route.c:4914
Code: 41 80 3c 04 00 74 0a e8 90 d0 9b f7 48 8b 7c 24 08 48 8b 07 48 89 44 24 10 4c 89 f0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df &lt;80&gt; 3c 08 00 74 08 4c 89 f7 e8 64 d0 9b f7 48 8b 44 24 18 49 39 06
RSP: 0018:ffffc900047374e0 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 1ffff1100fdf8f33 RCX: dffffc0000000000
RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff88807efc78c0
RBP: ffffc900047375d0 R08: 0000000000000003 R09: fffff520008e6e8c
R10: dffffc0000000000 R11: fffff520008e6e8c R12: 1ffff1100fdf8f18
R13: ffff88807efc7998 R14: 0000000000000000 R15: ffff88807efc7930
FS:  0000000000000000(0000) GS:ffff8880b8900000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020002a80 CR3: 0000000022f62000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  addrconf_ifdown+0x15d/0x1bd0 net/ipv6/addrconf.c:3856
 addrconf_notify+0x3cb/0x1020
  notifier_call_chain+0x19f/0x3e0 kernel/notifier.c:93
  call_netdevice_notifiers_extack net/core/dev.c:2032 [inline]
  call_netdevice_notifiers net/core/dev.c:2046 [inline]
  unregister_netdevice_many_notify+0xd81/0x1c40 net/core/dev.c:11352
  unregister_netdevice_many net/core/dev.c:11414 [inline]
  unregister_netdevice_queue+0x303/0x370 net/core/dev.c:11289
  unregister_netdevice include/linux/netdevice.h:3129 [inline]
  __tun_detach+0x6b9/0x1600 drivers/net/tun.c:685
  tun_detach drivers/net/tun.c:701 [inline]
  tun_chr_close+0x108/0x1b0 drivers/net/tun.c:3510
  __fput+0x24a/0x8a0 fs/file_table.c:422
  task_work_run+0x24f/0x310 kernel/task_work.c:228
  exit_task_work include/linux/task_work.h:40 [inline]
  do_exit+0xa2f/0x27f0 kernel/exit.c:882
  do_group_exit+0x207/0x2c0 kernel/exit.c:1031
  __do_sys_exit_group kernel/exit.c:1042 [inline]
  __se_sys_exit_group kernel/exit.c:1040 [inline]
  __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1040
  x64_sys_call+0x2634/0x2640 arch/x86/include/generated/asm/syscalls_64.h:232
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1acc77def9
Code: Unable to access opcode bytes at 0x7f1acc77decf.
RSP: 002b:00007ffeb26fa738 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1acc77def9
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000043
RBP: 00007f1acc7dd508 R08: 00007ffeb26f84d7 R09: 0000000000000003
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
R13: 0000000000000003 R14: 00000000ffffffff R15: 00007ffeb26fa8e0
 &lt;/TASK&gt;
Modules linked in:
---[ end trace 0000000000000000 ]---
 RIP: 0010:rt6_uncached_list_flush_dev net/ipv6/route.c:177 [inline]
 RIP: 0010:rt6_disable_ip+0x33e/0x7e0 net/ipv6/route.c:4914
Code: 41 80 3c 04 00 74 0a e8 90 d0 9b f7 48 8b 7c 24 08 48 8b 07 48 89 44 24 10 4c 89 f0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df &lt;80&gt; 3c 08 00 74 08 4c 89 f7 e8 64 d0 9b f7 48 8b 44 24 18 49 39 06
RSP: 0018:ffffc900047374e0 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 1ffff1100fdf8f33 RCX: dffffc0000000000
RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff88807efc78c0
R
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-47707</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47707.html</URL>
        <Description>CVE-2024-47707</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231935</URL>
        <Description>SUSE Bug 1231935</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="81">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop()

Since '__dev_queue_xmit()' should be called with interrupts enabled,
the following backtrace:

ieee80211_do_stop()
 ...
 spin_lock_irqsave(&amp;local-&gt;queue_stop_reason_lock, flags)
 ...
 ieee80211_free_txskb()
  ieee80211_report_used_skb()
   ieee80211_report_ack_skb()
    cfg80211_mgmt_tx_status_ext()
     nl80211_frame_tx_status()
      genlmsg_multicast_netns()
       genlmsg_multicast_netns_filtered()
        nlmsg_multicast_filtered()
	 netlink_broadcast_filtered()
	  do_one_broadcast()
	   netlink_broadcast_deliver()
	    __netlink_sendskb()
	     netlink_deliver_tap()
	      __netlink_deliver_tap_skb()
	       dev_queue_xmit()
	        __dev_queue_xmit() ; with IRQS disabled
 ...
 spin_unlock_irqrestore(&amp;local-&gt;queue_stop_reason_lock, flags)

issues the warning (as reported by syzbot reproducer):

WARNING: CPU: 2 PID: 5128 at kernel/softirq.c:362 __local_bh_enable_ip+0xc3/0x120

Fix this by implementing a two-phase skb reclamation in
'ieee80211_do_stop()', where actual work is performed
outside of a section with interrupts disabled.</Note>
    </Notes>
    <CVE>CVE-2024-47713</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47713.html</URL>
        <Description>CVE-2024-47713</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232016</URL>
        <Description>SUSE Bug 1232016</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="82">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled

Fix missuse of spin_lock_irq()/spin_unlock_irq() when
spin_lock_irqsave()/spin_lock_irqrestore() was hold.

This was discovered through the lock debugging, and the corresponding
log is as follows:

raw_local_irq_restore() called with IRQs enabled
WARNING: CPU: 96 PID: 2074 at kernel/locking/irqflag-debug.c:10 warn_bogus_irq_restore+0x30/0x40
...
Call trace:
 warn_bogus_irq_restore+0x30/0x40
 _raw_spin_unlock_irqrestore+0x84/0xc8
 add_qp_to_list+0x11c/0x148 [hns_roce_hw_v2]
 hns_roce_create_qp_common.constprop.0+0x240/0x780 [hns_roce_hw_v2]
 hns_roce_create_qp+0x98/0x160 [hns_roce_hw_v2]
 create_qp+0x138/0x258
 ib_create_qp_kernel+0x50/0xe8
 create_mad_qp+0xa8/0x128
 ib_mad_port_open+0x218/0x448
 ib_mad_init_device+0x70/0x1f8
 add_client_context+0xfc/0x220
 enable_device_and_get+0xd0/0x140
 ib_register_device.part.0+0xf4/0x1c8
 ib_register_device+0x34/0x50
 hns_roce_register_device+0x174/0x3d0 [hns_roce_hw_v2]
 hns_roce_init+0xfc/0x2c0 [hns_roce_hw_v2]
 __hns_roce_hw_v2_init_instance+0x7c/0x1d0 [hns_roce_hw_v2]
 hns_roce_hw_v2_init_instance+0x9c/0x180 [hns_roce_hw_v2]</Note>
    </Notes>
    <CVE>CVE-2024-47735</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47735.html</URL>
        <Description>CVE-2024-47735</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232111</URL>
        <Description>SUSE Bug 1232111</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="83">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nfsd: call cache_put if xdr_reserve_space returns NULL

If not enough buffer space available, but idmap_lookup has triggered
lookup_fn which calls cache_get and returns successfully. Then we
missed to call cache_put here which pairs with cache_get.

Reviwed-by: Jeff Layton &lt;jlayton@kernel.org&gt;</Note>
    </Notes>
    <CVE>CVE-2024-47737</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47737.html</URL>
        <Description>CVE-2024-47737</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232056</URL>
        <Description>SUSE Bug 1232056</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="84">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

firmware_loader: Block path traversal

Most firmware names are hardcoded strings, or are constructed from fairly
constrained format strings where the dynamic parts are just some hex
numbers or such.

However, there are a couple codepaths in the kernel where firmware file
names contain string components that are passed through from a device or
semi-privileged userspace; the ones I could find (not counting interfaces
that require root privileges) are:

 - lpfc_sli4_request_firmware_update() seems to construct the firmware
   filename from "ModelName", a string that was previously parsed out of
   some descriptor ("Vital Product Data") in lpfc_fill_vpd()
 - nfp_net_fw_find() seems to construct a firmware filename from a model
   name coming from nfp_hwinfo_lookup(pf-&gt;hwinfo, "nffw.partno"), which I
   think parses some descriptor that was read from the device.
   (But this case likely isn't exploitable because the format string looks
   like "netronome/nic_%s", and there shouldn't be any *folders* starting
   with "netronome/nic_". The previous case was different because there,
   the "%s" is *at the start* of the format string.)
 - module_flash_fw_schedule() is reachable from the
   ETHTOOL_MSG_MODULE_FW_FLASH_ACT netlink command, which is marked as
   GENL_UNS_ADMIN_PERM (meaning CAP_NET_ADMIN inside a user namespace is
   enough to pass the privilege check), and takes a userspace-provided
   firmware name.
   (But I think to reach this case, you need to have CAP_NET_ADMIN over a
   network namespace that a special kind of ethernet device is mapped into,
   so I think this is not a viable attack path in practice.)

Fix it by rejecting any firmware names containing ".." path components.

For what it's worth, I went looking and haven't found any USB device
drivers that use the firmware loader dangerously.</Note>
    </Notes>
    <CVE>CVE-2024-47742</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47742.html</URL>
        <Description>CVE-2024-47742</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232126</URL>
        <Description>SUSE Bug 1232126</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="85">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mm: call the security_mmap_file() LSM hook in remap_file_pages()

The remap_file_pages syscall handler calls do_mmap() directly, which
doesn't contain the LSM security check. And if the process has called
personality(READ_IMPLIES_EXEC) before and remap_file_pages() is called for
RW pages, this will actually result in remapping the pages to RWX,
bypassing a W^X policy enforced by SELinux.

So we should check prot by security_mmap_file LSM hook in the
remap_file_pages syscall handler before do_mmap() is called. Otherwise, it
potentially permits an attacker to bypass a W^X policy enforced by
SELinux.

The bypass is similar to CVE-2016-10044, which bypass the same thing via
AIO and can be found in [1].

The PoC:

$ cat &gt; test.c

int main(void) {
	size_t pagesz = sysconf(_SC_PAGE_SIZE);
	int mfd = syscall(SYS_memfd_create, "test", 0);
	const char *buf = mmap(NULL, 4 * pagesz, PROT_READ | PROT_WRITE,
		MAP_SHARED, mfd, 0);
	unsigned int old = syscall(SYS_personality, 0xffffffff);
	syscall(SYS_personality, READ_IMPLIES_EXEC | old);
	syscall(SYS_remap_file_pages, buf, pagesz, 0, 2, 0);
	syscall(SYS_personality, old);
	// show the RWX page exists even if W^X policy is enforced
	int fd = open("/proc/self/maps", O_RDONLY);
	unsigned char buf2[1024];
	while (1) {
		int ret = read(fd, buf2, 1024);
		if (ret &lt;= 0) break;
		write(1, buf2, ret);
	}
	close(fd);
}

$ gcc test.c -o test
$ ./test | grep rwx
7f1836c34000-7f1836c35000 rwxs 00002000 00:01 2050 /memfd:test (deleted)

[PM: subject line tweaks]</Note>
    </Notes>
    <CVE>CVE-2024-47745</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47745.html</URL>
        <Description>CVE-2024-47745</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232135</URL>
        <Description>SUSE Bug 1232135</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="86">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/cxgb4: Added NULL check for lookup_atid

The lookup_atid() function can return NULL if the ATID is
invalid or does not exist in the identifier table, which
could lead to dereferencing a null pointer without a
check in the `act_establish()` and `act_open_rpl()` functions.
Add a NULL check to prevent null pointer dereferencing.

Found by Linux Verification Center (linuxtesting.org) with SVACE.</Note>
    </Notes>
    <CVE>CVE-2024-47749</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47749.html</URL>
        <Description>CVE-2024-47749</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232180</URL>
        <Description>SUSE Bug 1232180</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="87">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tpm: Clean up TPM space after command failure

tpm_dev_transmit prepares the TPM space before attempting command
transmission. However if the command fails no rollback of this
preparation is done. This can result in transient handles being leaked
if the device is subsequently closed with no further commands performed.

Fix this by flushing the space in the event of command transmission
failure.</Note>
    </Notes>
    <CVE>CVE-2024-49851</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49851.html</URL>
        <Description>CVE-2024-49851</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232134</URL>
        <Description>SUSE Bug 1232134</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="88">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ACPI: sysfs: validate return type of _STR method

Only buffer objects are valid return values of _STR.

If something else is returned description_show() will access invalid
memory.</Note>
    </Notes>
    <CVE>CVE-2024-49860</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49860.html</URL>
        <Description>CVE-2024-49860</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231861</URL>
        <Description>SUSE Bug 1231861</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231862</URL>
        <Description>SUSE Bug 1231862</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="89">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate

When doing cleanup, if flags without OCFS2_BH_READAHEAD, it may trigger
NULL pointer dereference in the following ocfs2_set_buffer_uptodate() if
bh is NULL.</Note>
    </Notes>
    <CVE>CVE-2024-49877</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49877.html</URL>
        <Description>CVE-2024-49877</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232339</URL>
        <Description>SUSE Bug 1232339</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="90">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ext4: update orig_path in ext4_find_extent()

In ext4_find_extent(), if the path is not big enough, we free it and set
*orig_path to NULL. But after reallocating and successfully initializing
the path, we don't update *orig_path, in which case the caller gets a
valid path but a NULL ppath, and this may cause a NULL pointer dereference
or a path memory leak. For example:

ext4_split_extent
  path = *ppath = 2000
  ext4_find_extent
    if (depth &gt; path[0].p_maxdepth)
      kfree(path = 2000);
      *orig_path = path = NULL;
      path = kcalloc() = 3000
  ext4_split_extent_at(*ppath = NULL)
    path = *ppath;
    ex = path[depth].p_ext;
    // NULL pointer dereference!

==================================================================
BUG: kernel NULL pointer dereference, address: 0000000000000010
CPU: 6 UID: 0 PID: 576 Comm: fsstress Not tainted 6.11.0-rc2-dirty #847
RIP: 0010:ext4_split_extent_at+0x6d/0x560
Call Trace:
 &lt;TASK&gt;
 ext4_split_extent.isra.0+0xcb/0x1b0
 ext4_ext_convert_to_initialized+0x168/0x6c0
 ext4_ext_handle_unwritten_extents+0x325/0x4d0
 ext4_ext_map_blocks+0x520/0xdb0
 ext4_map_blocks+0x2b0/0x690
 ext4_iomap_begin+0x20e/0x2c0
[...]
==================================================================

Therefore, *orig_path is updated when the extent lookup succeeds, so that
the caller can safely use path or *ppath.</Note>
    </Notes>
    <CVE>CVE-2024-49881</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49881.html</URL>
        <Description>CVE-2024-49881</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232201</URL>
        <Description>SUSE Bug 1232201</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="91">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ext4: fix double brelse() the buffer of the extents path

In ext4_ext_try_to_merge_up(), set path[1].p_bh to NULL after it has been
released, otherwise it may be released twice. An example of what triggers
this is as follows:

  split2    map    split1
|--------|-------|--------|

ext4_ext_map_blocks
 ext4_ext_handle_unwritten_extents
  ext4_split_convert_extents
   // path-&gt;p_depth == 0
   ext4_split_extent
     // 1. do split1
     ext4_split_extent_at
       |ext4_ext_insert_extent
       |  ext4_ext_create_new_leaf
       |    ext4_ext_grow_indepth
       |      le16_add_cpu(&amp;neh-&gt;eh_depth, 1)
       |    ext4_find_extent
       |      // return -ENOMEM
       |// get error and try zeroout
       |path = ext4_find_extent
       |  path-&gt;p_depth = 1
       |ext4_ext_try_to_merge
       |  ext4_ext_try_to_merge_up
       |    path-&gt;p_depth = 0
       |    brelse(path[1].p_bh)  ---&gt; not set to NULL here
       |// zeroout success
     // 2. update path
     ext4_find_extent
     // 3. do split2
     ext4_split_extent_at
       ext4_ext_insert_extent
         ext4_ext_create_new_leaf
           ext4_ext_grow_indepth
             le16_add_cpu(&amp;neh-&gt;eh_depth, 1)
           ext4_find_extent
             path[0].p_bh = NULL;
             path-&gt;p_depth = 1
             read_extent_tree_block  ---&gt; return err
             // path[1].p_bh is still the old value
             ext4_free_ext_path
               ext4_ext_drop_refs
                 // path-&gt;p_depth == 1
                 brelse(path[1].p_bh)  ---&gt; brelse a buffer twice

Finally got the following WARRNING when removing the buffer from lru:

============================================
VFS: brelse: Trying to free free buffer
WARNING: CPU: 2 PID: 72 at fs/buffer.c:1241 __brelse+0x58/0x90
CPU: 2 PID: 72 Comm: kworker/u19:1 Not tainted 6.9.0-dirty #716
RIP: 0010:__brelse+0x58/0x90
Call Trace:
 &lt;TASK&gt;
 __find_get_block+0x6e7/0x810
 bdev_getblk+0x2b/0x480
 __ext4_get_inode_loc+0x48a/0x1240
 ext4_get_inode_loc+0xb2/0x150
 ext4_reserve_inode_write+0xb7/0x230
 __ext4_mark_inode_dirty+0x144/0x6a0
 ext4_ext_insert_extent+0x9c8/0x3230
 ext4_ext_map_blocks+0xf45/0x2dc0
 ext4_map_blocks+0x724/0x1700
 ext4_do_writepages+0x12d6/0x2a70
[...]
============================================</Note>
    </Notes>
    <CVE>CVE-2024-49882</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49882.html</URL>
        <Description>CVE-2024-49882</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232200</URL>
        <Description>SUSE Bug 1232200</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="92">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ext4: aovid use-after-free in ext4_ext_insert_extent()

As Ojaswin mentioned in Link, in ext4_ext_insert_extent(), if the path is
reallocated in ext4_ext_create_new_leaf(), we'll use the stale path and
cause UAF. Below is a sample trace with dummy values:

ext4_ext_insert_extent
  path = *ppath = 2000
  ext4_ext_create_new_leaf(ppath)
    ext4_find_extent(ppath)
      path = *ppath = 2000
      if (depth &gt; path[0].p_maxdepth)
            kfree(path = 2000);
            *ppath = path = NULL;
      path = kcalloc() = 3000
      *ppath = 3000;
      return path;
  /* here path is still 2000, UAF! */
  eh = path[depth].p_hdr

==================================================================
BUG: KASAN: slab-use-after-free in ext4_ext_insert_extent+0x26d4/0x3330
Read of size 8 at addr ffff8881027bf7d0 by task kworker/u36:1/179
CPU: 3 UID: 0 PID: 179 Comm: kworker/u6:1 Not tainted 6.11.0-rc2-dirty #866
Call Trace:
 &lt;TASK&gt;
 ext4_ext_insert_extent+0x26d4/0x3330
 ext4_ext_map_blocks+0xe22/0x2d40
 ext4_map_blocks+0x71e/0x1700
 ext4_do_writepages+0x1290/0x2800
[...]

Allocated by task 179:
 ext4_find_extent+0x81c/0x1f70
 ext4_ext_map_blocks+0x146/0x2d40
 ext4_map_blocks+0x71e/0x1700
 ext4_do_writepages+0x1290/0x2800
 ext4_writepages+0x26d/0x4e0
 do_writepages+0x175/0x700
[...]

Freed by task 179:
 kfree+0xcb/0x240
 ext4_find_extent+0x7c0/0x1f70
 ext4_ext_insert_extent+0xa26/0x3330
 ext4_ext_map_blocks+0xe22/0x2d40
 ext4_map_blocks+0x71e/0x1700
 ext4_do_writepages+0x1290/0x2800
 ext4_writepages+0x26d/0x4e0
 do_writepages+0x175/0x700
[...]
==================================================================

So use *ppath to update the path to avoid the above problem.</Note>
    </Notes>
    <CVE>CVE-2024-49883</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49883.html</URL>
        <Description>CVE-2024-49883</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232199</URL>
        <Description>SUSE Bug 1232199</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="93">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pm: ensure the fw_info is not null before using it

This resolves the dereference null return value warning
reported by Coverity.</Note>
    </Notes>
    <CVE>CVE-2024-49890</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49890.html</URL>
        <Description>CVE-2024-49890</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232217</URL>
        <Description>SUSE Bug 1232217</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="94">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths

When the HBA is undergoing a reset or is handling an errata event, NULL ptr
dereference crashes may occur in routines such as
lpfc_sli_flush_io_rings(), lpfc_dev_loss_tmo_callbk(), or
lpfc_abort_handler().

Add NULL ptr checks before dereferencing hdwq pointers that may have been
freed due to operations colliding with a reset or errata event handler.</Note>
    </Notes>
    <CVE>CVE-2024-49891</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49891.html</URL>
        <Description>CVE-2024-49891</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232218</URL>
        <Description>SUSE Bug 1232218</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="95">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix index out of bounds in degamma hardware format translation

Fixes index out of bounds issue in
`cm_helper_translate_curve_to_degamma_hw_format` function. The issue
could occur when the index 'i' exceeds the number of transfer function
points (TRANSFER_FUNC_POINTS).

The fix adds a check to ensure 'i' is within bounds before accessing the
transfer function points. If 'i' is out of bounds the function returns
false to indicate an error.

Reported by smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:594 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf-&gt;tf_pts.red' 1025 &lt;= s32max
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:595 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf-&gt;tf_pts.green' 1025 &lt;= s32max
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:596 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf-&gt;tf_pts.blue' 1025 &lt;= s32max</Note>
    </Notes>
    <CVE>CVE-2024-49894</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49894.html</URL>
        <Description>CVE-2024-49894</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232354</URL>
        <Description>SUSE Bug 1232354</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="96">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check stream before comparing them

[WHAT &amp; HOW]
amdgpu_dm can pass a null stream to dc_is_stream_unchanged. It is
necessary to check for null before dereferencing them.

This fixes 1 FORWARD_NULL issue reported by Coverity.</Note>
    </Notes>
    <CVE>CVE-2024-49896</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49896.html</URL>
        <Description>CVE-2024-49896</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232221</URL>
        <Description>SUSE Bug 1232221</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="97">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/msm/adreno: Assign msm_gpu-&gt;pdev earlier to avoid nullptrs

There are some cases, such as the one uncovered by Commit 46d4efcccc68
("drm/msm/a6xx: Avoid a nullptr dereference when speedbin setting fails")
where

msm_gpu_cleanup() : platform_set_drvdata(gpu-&gt;pdev, NULL);

is called on gpu-&gt;pdev == NULL, as the GPU device has not been fully
initialized yet.

Turns out that there's more than just the aforementioned path that
causes this to happen (e.g. the case when there's speedbin data in the
catalog, but opp-supported-hw is missing in DT).

Assigning msm_gpu-&gt;pdev earlier seems like the least painful solution
to this, therefore do so.

Patchwork: https://patchwork.freedesktop.org/patch/602742/</Note>
    </Notes>
    <CVE>CVE-2024-49901</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49901.html</URL>
        <Description>CVE-2024-49901</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232305</URL>
        <Description>SUSE Bug 1232305</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="98">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check null pointers before multiple uses

[WHAT &amp; HOW]
Poniters, such as stream_enc and dc-&gt;bw_vbios, are null checked previously
in the same function, so Coverity warns "implies that stream_enc and
dc-&gt;bw_vbios might be null". They are used multiple times in the
subsequent code and need to be checked.

This fixes 10 FORWARD_NULL issues reported by Coverity.</Note>
    </Notes>
    <CVE>CVE-2024-49920</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49920.html</URL>
        <Description>CVE-2024-49920</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232313</URL>
        <Description>SUSE Bug 1232313</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="99">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: avoid NULL pointer dereference

iwl_mvm_tx_skb_sta() and iwl_mvm_tx_mpdu() verify that the mvmvsta
pointer is not NULL.
It retrieves this pointer using iwl_mvm_sta_from_mac80211, which is
dereferencing the ieee80211_sta pointer.
If sta is NULL, iwl_mvm_sta_from_mac80211 will dereference a NULL
pointer.
Fix this by checking the sta pointer before retrieving the mvmsta
from it. If sta is not NULL, then mvmsta isn't either.</Note>
    </Notes>
    <CVE>CVE-2024-49929</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49929.html</URL>
        <Description>CVE-2024-49929</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232253</URL>
        <Description>SUSE Bug 1232253</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="100">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/xen-netback: prevent UAF in xenvif_flush_hash()

During the list_for_each_entry_rcu iteration call of xenvif_flush_hash,
kfree_rcu does not exist inside the rcu read critical section, so if
kfree_rcu is called when the rcu grace period ends during the iteration,
UAF occurs when accessing head-&gt;next after the entry becomes free.

Therefore, to solve this, you need to change it to list_for_each_entry_safe.</Note>
    </Notes>
    <CVE>CVE-2024-49936</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49936.html</URL>
        <Description>CVE-2024-49936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232424</URL>
        <Description>SUSE Bug 1232424</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232426</URL>
        <Description>SUSE Bug 1232426</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="101">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: avoid potential underflow in qdisc_pkt_len_init() with UFO

After commit 7c6d2ecbda83 ("net: be more gentle about silly gso
requests coming from user") virtio_net_hdr_to_skb() had sanity check
to detect malicious attempts from user space to cook a bad GSO packet.

Then commit cf9acc90c80ec ("net: virtio_net_hdr_to_skb: count
transport header in UFO") while fixing one issue, allowed user space
to cook a GSO packet with the following characteristic :

IPv4 SKB_GSO_UDP, gso_size=3, skb-&gt;len = 28.

When this packet arrives in qdisc_pkt_len_init(), we end up
with hdr_len = 28 (IPv4 header + UDP header), matching skb-&gt;len

Then the following sets gso_segs to 0 :

gso_segs = DIV_ROUND_UP(skb-&gt;len - hdr_len,
                        shinfo-&gt;gso_size);

Then later we set qdisc_skb_cb(skb)-&gt;pkt_len to back to zero :/

qdisc_skb_cb(skb)-&gt;pkt_len += (gso_segs - 1) * hdr_len;

This leads to the following crash in fq_codel [1]

qdisc_pkt_len_init() is best effort, we only want an estimation
of the bytes sent on the wire, not crashing the kernel.

This patch is fixing this particular issue, a following one
adds more sanity checks for another potential bug.

[1]
[   70.724101] BUG: kernel NULL pointer dereference, address: 0000000000000000
[   70.724561] #PF: supervisor read access in kernel mode
[   70.724561] #PF: error_code(0x0000) - not-present page
[   70.724561] PGD 10ac61067 P4D 10ac61067 PUD 107ee2067 PMD 0
[   70.724561] Oops: Oops: 0000 [#1] SMP NOPTI
[   70.724561] CPU: 11 UID: 0 PID: 2163 Comm: b358537762 Not tainted 6.11.0-virtme #991
[   70.724561] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   70.724561] RIP: 0010:fq_codel_enqueue (net/sched/sch_fq_codel.c:120 net/sched/sch_fq_codel.c:168 net/sched/sch_fq_codel.c:230) sch_fq_codel
[ 70.724561] Code: 24 08 49 c1 e1 06 44 89 7c 24 18 45 31 ed 45 31 c0 31 ff 89 44 24 14 4c 03 8b 90 01 00 00 eb 04 39 ca 73 37 4d 8b 39 83 c7 01 &lt;49&gt; 8b 17 49 89 11 41 8b 57 28 45 8b 5f 34 49 c7 07 00 00 00 00 49
All code
========
   0:	24 08                	and    $0x8,%al
   2:	49 c1 e1 06          	shl    $0x6,%r9
   6:	44 89 7c 24 18       	mov    %r15d,0x18(%rsp)
   b:	45 31 ed             	xor    %r13d,%r13d
   e:	45 31 c0             	xor    %r8d,%r8d
  11:	31 ff                	xor    %edi,%edi
  13:	89 44 24 14          	mov    %eax,0x14(%rsp)
  17:	4c 03 8b 90 01 00 00 	add    0x190(%rbx),%r9
  1e:	eb 04                	jmp    0x24
  20:	39 ca                	cmp    %ecx,%edx
  22:	73 37                	jae    0x5b
  24:	4d 8b 39             	mov    (%r9),%r15
  27:	83 c7 01             	add    $0x1,%edi
  2a:*	49 8b 17             	mov    (%r15),%rdx		&lt;-- trapping instruction
  2d:	49 89 11             	mov    %rdx,(%r9)
  30:	41 8b 57 28          	mov    0x28(%r15),%edx
  34:	45 8b 5f 34          	mov    0x34(%r15),%r11d
  38:	49 c7 07 00 00 00 00 	movq   $0x0,(%r15)
  3f:	49                   	rex.WB

Code starting with the faulting instruction
===========================================
   0:	49 8b 17             	mov    (%r15),%rdx
   3:	49 89 11             	mov    %rdx,(%r9)
   6:	41 8b 57 28          	mov    0x28(%r15),%edx
   a:	45 8b 5f 34          	mov    0x34(%r15),%r11d
   e:	49 c7 07 00 00 00 00 	movq   $0x0,(%r15)
  15:	49                   	rex.WB
[   70.724561] RSP: 0018:ffff95ae85e6fb90 EFLAGS: 00000202
[   70.724561] RAX: 0000000002000000 RBX: ffff95ae841de000 RCX: 0000000000000000
[   70.724561] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001
[   70.724561] RBP: ffff95ae85e6fbf8 R08: 0000000000000000 R09: ffff95b710a30000
[   70.724561] R10: 0000000000000000 R11: bdf289445ce31881 R12: ffff95ae85e6fc58
[   70.724561] R13: 0000000000000000 R14: 0000000000000040 R15: 0000000000000000
[   70.724561] FS:  000000002c5c1380(0000) GS:ffff95bd7fcc0000(0000) knlGS:0000000000000000
[   70.724561] CS:  0010 DS: 0000 ES: 0000 C
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-49949</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49949.html</URL>
        <Description>CVE-2024-49949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232160</URL>
        <Description>SUSE Bug 1232160</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="102">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix null-ptr-deref when journal load failed.

During the mounting process, if journal_reset() fails because of too short
journal, then lead to jbd2_journal_load() fails with NULL j_sb_buffer. 
Subsequently, ocfs2_journal_shutdown() calls
jbd2_journal_flush()-&gt;jbd2_cleanup_journal_tail()-&gt;
__jbd2_update_log_tail()-&gt;jbd2_journal_update_sb_log_tail()
-&gt;lock_buffer(journal-&gt;j_sb_buffer), resulting in a null-pointer
dereference error.

To resolve this issue, we should check the JBD2_LOADED flag to ensure the
journal was properly loaded.  Additionally, use journal instead of
osb-&gt;journal directly to simplify the code.</Note>
    </Notes>
    <CVE>CVE-2024-49957</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49957.html</URL>
        <Description>CVE-2024-49957</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232152</URL>
        <Description>SUSE Bug 1232152</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="103">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ocfs2: reserve space for inline xattr before attaching reflink tree

One of our customers reported a crash and a corrupted ocfs2 filesystem. 
The crash was due to the detection of corruption.  Upon troubleshooting,
the fsck -fn output showed the below corruption

[EXTENT_LIST_FREE] Extent list in owner 33080590 claims 230 as the next free chain record,
but fsck believes the largest valid value is 227.  Clamp the next record value? n

The stat output from the debugfs.ocfs2 showed the following corruption
where the "Next Free Rec:" had overshot the "Count:" in the root metadata
block.

        Inode: 33080590   Mode: 0640   Generation: 2619713622 (0x9c25a856)
        FS Generation: 904309833 (0x35e6ac49)
        CRC32: 00000000   ECC: 0000
        Type: Regular   Attr: 0x0   Flags: Valid
        Dynamic Features: (0x16) HasXattr InlineXattr Refcounted
        Extended Attributes Block: 0  Extended Attributes Inline Size: 256
        User: 0 (root)   Group: 0 (root)   Size: 281320357888
        Links: 1   Clusters: 141738
        ctime: 0x66911b56 0x316edcb8 -- Fri Jul 12 06:02:30.829349048 2024
        atime: 0x66911d6b 0x7f7a28d -- Fri Jul 12 06:11:23.133669517 2024
        mtime: 0x66911b56 0x12ed75d7 -- Fri Jul 12 06:02:30.317552087 2024
        dtime: 0x0 -- Wed Dec 31 17:00:00 1969
        Refcount Block: 2777346
        Last Extblk: 2886943   Orphan Slot: 0
        Sub Alloc Slot: 0   Sub Alloc Bit: 14
        Tree Depth: 1   Count: 227   Next Free Rec: 230
        ## Offset        Clusters       Block#
        0  0             2310           2776351
        1  2310          2139           2777375
        2  4449          1221           2778399
        3  5670          731            2779423
        4  6401          566            2780447
        .......          ....           .......
        .......          ....           .......

The issue was in the reflink workfow while reserving space for inline
xattr.  The problematic function is ocfs2_reflink_xattr_inline().  By the
time this function is called the reflink tree is already recreated at the
destination inode from the source inode.  At this point, this function
reserves space for inline xattrs at the destination inode without even
checking if there is space at the root metadata block.  It simply reduces
the l_count from 243 to 227 thereby making space of 256 bytes for inline
xattr whereas the inode already has extents beyond this index (in this
case up to 230), thereby causing corruption.

The fix for this is to reserve space for inline metadata at the destination
inode before the reflink tree gets recreated. The customer has verified the
fix.</Note>
    </Notes>
    <CVE>CVE-2024-49958</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49958.html</URL>
        <Description>CVE-2024-49958</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232151</URL>
        <Description>SUSE Bug 1232151</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="104">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error

In __jbd2_log_wait_for_space(), we might call jbd2_cleanup_journal_tail()
to recover some journal space. But if an error occurs while executing
jbd2_cleanup_journal_tail() (e.g., an EIO), we don't stop waiting for free
space right away, we try other branches, and if j_committing_transaction
is NULL (i.e., the tid is 0), we will get the following complain:

============================================
JBD2: I/O error when updating journal superblock for sdd-8.
__jbd2_log_wait_for_space: needed 256 blocks and only had 217 space available
__jbd2_log_wait_for_space: no way to get more journal space in sdd-8
------------[ cut here ]------------
WARNING: CPU: 2 PID: 139804 at fs/jbd2/checkpoint.c:109 __jbd2_log_wait_for_space+0x251/0x2e0
Modules linked in:
CPU: 2 PID: 139804 Comm: kworker/u8:3 Not tainted 6.6.0+ #1
RIP: 0010:__jbd2_log_wait_for_space+0x251/0x2e0
Call Trace:
 &lt;TASK&gt;
 add_transaction_credits+0x5d1/0x5e0
 start_this_handle+0x1ef/0x6a0
 jbd2__journal_start+0x18b/0x340
 ext4_dirty_inode+0x5d/0xb0
 __mark_inode_dirty+0xe4/0x5d0
 generic_update_time+0x60/0x70
[...]
============================================

So only if jbd2_cleanup_journal_tail() returns 1, i.e., there is nothing to
clean up at the moment, continue to try to reclaim free space in other ways.

Note that this fix relies on commit 6f6a6fda2945 ("jbd2: fix ocfs2 corrupt
when updating journal superblock fails") to make jbd2_cleanup_journal_tail
return the correct error code.</Note>
    </Notes>
    <CVE>CVE-2024-49959</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49959.html</URL>
        <Description>CVE-2024-49959</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232149</URL>
        <Description>SUSE Bug 1232149</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="105">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package()

ACPICA commit 4d4547cf13cca820ff7e0f859ba83e1a610b9fd0

ACPI_ALLOCATE_ZEROED() may fail, elements might be NULL and will cause
NULL pointer dereference later.

[ rjw: Subject and changelog edits ]</Note>
    </Notes>
    <CVE>CVE-2024-49962</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49962.html</URL>
        <Description>CVE-2024-49962</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232314</URL>
        <Description>SUSE Bug 1232314</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="106">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ocfs2: remove unreasonable unlock in ocfs2_read_blocks

Patch series "Misc fixes for ocfs2_read_blocks", v5.

This series contains 2 fixes for ocfs2_read_blocks().  The first patch fix
the issue reported by syzbot, which detects bad unlock balance in
ocfs2_read_blocks().  The second patch fixes an issue reported by Heming
Zhao when reviewing above fix.


This patch (of 2):

There was a lock release before exiting, so remove the unreasonable unlock.</Note>
    </Notes>
    <CVE>CVE-2024-49965</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49965.html</URL>
        <Description>CVE-2024-49965</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232142</URL>
        <Description>SUSE Bug 1232142</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="107">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ocfs2: cancel dqi_sync_work before freeing oinfo

ocfs2_global_read_info() will initialize and schedule dqi_sync_work at the
end, if error occurs after successfully reading global quota, it will
trigger the following warning with CONFIG_DEBUG_OBJECTS_* enabled:

ODEBUG: free active (active state 0) object: 00000000d8b0ce28 object type: timer_list hint: qsync_work_fn+0x0/0x16c

This reports that there is an active delayed work when freeing oinfo in
error handling, so cancel dqi_sync_work first.  BTW, return status instead
of -1 when .read_file_info fails.</Note>
    </Notes>
    <CVE>CVE-2024-49966</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49966.html</URL>
        <Description>CVE-2024-49966</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232141</URL>
        <Description>SUSE Bug 1232141</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="108">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.</Note>
    </Notes>
    <CVE>CVE-2024-49967</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49967.html</URL>
        <Description>CVE-2024-49967</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232140</URL>
        <Description>SUSE Bug 1232140</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="109">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

aoe: fix the potential use-after-free problem in more places

For fixing CVE-2023-6270, f98364e92662 ("aoe: fix the potential
use-after-free problem in aoecmd_cfg_pkts") makes tx() calling dev_put()
instead of doing in aoecmd_cfg_pkts(). It avoids that the tx() runs
into use-after-free.

Then Nicolai Stange found more places in aoe have potential use-after-free
problem with tx(). e.g. revalidate(), aoecmd_ata_rw(), resend(), probe()
and aoecmd_cfg_rsp(). Those functions also use aoenet_xmit() to push
packet to tx queue. So they should also use dev_hold() to increase the
refcnt of skb-&gt;dev.

On the other hand, moving dev_put() to tx() causes that the refcnt of
skb-&gt;dev be reduced to a negative value, because corresponding
dev_hold() are not called in revalidate(), aoecmd_ata_rw(), resend(),
probe(), and aoecmd_cfg_rsp(). This patch fixed this issue.</Note>
    </Notes>
    <CVE>CVE-2024-49982</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49982.html</URL>
        <Description>CVE-2024-49982</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232097</URL>
        <Description>SUSE Bug 1232097</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="110">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer

Pass pointer reference to amdgpu_bo_unref to clear the correct pointer,
otherwise amdgpu_bo_unref clear the local variable, the original pointer
not set to NULL, this could cause use-after-free bug.</Note>
    </Notes>
    <CVE>CVE-2024-49991</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49991.html</URL>
        <Description>CVE-2024-49991</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232282</URL>
        <Description>SUSE Bug 1232282</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232284</URL>
        <Description>SUSE Bug 1232284</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="111">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tipc: guard against string buffer overrun

Smatch reports that copying media_name and if_name to name_parts may
overwrite the destination.

 .../bearer.c:166 bearer_name_validate() error: strcpy() 'media_name' too large for 'name_parts-&gt;media_name' (32 vs 16)
 .../bearer.c:167 bearer_name_validate() error: strcpy() 'if_name' too large for 'name_parts-&gt;if_name' (1010102 vs 16)

This does seem to be the case so guard against this possibility by using
strscpy() and failing if truncation occurs.

Introduced by commit b97bf3fd8f6a ("[TIPC] Initial merge")

Compile tested only.</Note>
    </Notes>
    <CVE>CVE-2024-49995</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49995.html</URL>
        <Description>CVE-2024-49995</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232432</URL>
        <Description>SUSE Bug 1232432</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232433</URL>
        <Description>SUSE Bug 1232433</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="112">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix buffer overflow when parsing NFS reparse points

ReparseDataLength is sum of the InodeType size and DataBuffer size.
So to get DataBuffer size it is needed to subtract InodeType's size from
ReparseDataLength.

Function cifs_strndup_from_utf16() is currentlly accessing buf-&gt;DataBuffer
at position after the end of the buffer because it does not subtract
InodeType size from the length. Fix this problem and correctly subtract
variable len.

Member InodeType is present only when reparse buffer is large enough. Check
for ReparseDataLength before accessing InodeType to prevent another invalid
memory access.

Major and minor rdev values are present also only when reparse buffer is
large enough. Check for reparse buffer size before calling reparse_mkdev().</Note>
    </Notes>
    <CVE>CVE-2024-49996</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49996.html</URL>
        <Description>CVE-2024-49996</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232089</URL>
        <Description>SUSE Bug 1232089</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="113">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ext4: fix i_data_sem unlock order in ext4_ind_migrate()

Fuzzing reports a possible deadlock in jbd2_log_wait_commit.

This issue is triggered when an EXT4_IOC_MIGRATE ioctl is set to require
synchronous updates because the file descriptor is opened with O_SYNC.
This can lead to the jbd2_journal_stop() function calling
jbd2_might_wait_for_commit(), potentially causing a deadlock if the
EXT4_IOC_MIGRATE call races with a write(2) system call.

This problem only arises when CONFIG_PROVE_LOCKING is enabled. In this
case, the jbd2_might_wait_for_commit macro locks jbd2_handle in the
jbd2_journal_stop function while i_data_sem is locked. This triggers
lockdep because the jbd2_journal_start function might also lock the same
jbd2_handle simultaneously.

Found by Linux Verification Center (linuxtesting.org) with syzkaller.

Rule: add</Note>
    </Notes>
    <CVE>CVE-2024-50006</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50006.html</URL>
        <Description>CVE-2024-50006</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232442</URL>
        <Description>SUSE Bug 1232442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="114">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ALSA: asihpi: Fix potential OOB array access

ASIHPI driver stores some values in the static array upon a response
from the driver, and its index depends on the firmware.  We shouldn't
trust it blindly.

This patch adds a sanity check of the array index to fit in the array
size.</Note>
    </Notes>
    <CVE>CVE-2024-50007</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50007.html</URL>
        <Description>CVE-2024-50007</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232394</URL>
        <Description>SUSE Bug 1232394</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="115">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: Fix an unsafe loop on the list

The kernel may crash when deleting a genetlink family if there are still
listeners for that family:

Oops: Kernel access of bad area, sig: 11 [#1]
  ...
  NIP [c000000000c080bc] netlink_update_socket_mc+0x3c/0xc0
  LR [c000000000c0f764] __netlink_clear_multicast_users+0x74/0xc0
  Call Trace:
__netlink_clear_multicast_users+0x74/0xc0
genl_unregister_family+0xd4/0x2d0

Change the unsafe loop on the list to a safe one, because inside the
loop there is an element removal from this list.</Note>
    </Notes>
    <CVE>CVE-2024-50024</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50024.html</URL>
        <Description>CVE-2024-50024</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231954</URL>
        <Description>SUSE Bug 1231954</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="116">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

slip: make slhc_remember() more robust against malicious packets

syzbot found that slhc_remember() was missing checks against
malicious packets [1].

slhc_remember() only checked the size of the packet was at least 20,
which is not good enough.

We need to make sure the packet includes the IPv4 and TCP header
that are supposed to be carried.

Add iph and th pointers to make the code more readable.

[1]

BUG: KMSAN: uninit-value in slhc_remember+0x2e8/0x7b0 drivers/net/slip/slhc.c:666
  slhc_remember+0x2e8/0x7b0 drivers/net/slip/slhc.c:666
  ppp_receive_nonmp_frame+0xe45/0x35e0 drivers/net/ppp/ppp_generic.c:2455
  ppp_receive_frame drivers/net/ppp/ppp_generic.c:2372 [inline]
  ppp_do_recv+0x65f/0x40d0 drivers/net/ppp/ppp_generic.c:2212
  ppp_input+0x7dc/0xe60 drivers/net/ppp/ppp_generic.c:2327
  pppoe_rcv_core+0x1d3/0x720 drivers/net/ppp/pppoe.c:379
  sk_backlog_rcv+0x13b/0x420 include/net/sock.h:1113
  __release_sock+0x1da/0x330 net/core/sock.c:3072
  release_sock+0x6b/0x250 net/core/sock.c:3626
  pppoe_sendmsg+0x2b8/0xb90 drivers/net/ppp/pppoe.c:903
  sock_sendmsg_nosec net/socket.c:729 [inline]
  __sock_sendmsg+0x30f/0x380 net/socket.c:744
  ____sys_sendmsg+0x903/0xb60 net/socket.c:2602
  ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656
  __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742
  __do_sys_sendmmsg net/socket.c:2771 [inline]
  __se_sys_sendmmsg net/socket.c:2768 [inline]
  __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768
  x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Uninit was created at:
  slab_post_alloc_hook mm/slub.c:4091 [inline]
  slab_alloc_node mm/slub.c:4134 [inline]
  kmem_cache_alloc_node_noprof+0x6bf/0xb80 mm/slub.c:4186
  kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:587
  __alloc_skb+0x363/0x7b0 net/core/skbuff.c:678
  alloc_skb include/linux/skbuff.h:1322 [inline]
  sock_wmalloc+0xfe/0x1a0 net/core/sock.c:2732
  pppoe_sendmsg+0x3a7/0xb90 drivers/net/ppp/pppoe.c:867
  sock_sendmsg_nosec net/socket.c:729 [inline]
  __sock_sendmsg+0x30f/0x380 net/socket.c:744
  ____sys_sendmsg+0x903/0xb60 net/socket.c:2602
  ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656
  __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742
  __do_sys_sendmmsg net/socket.c:2771 [inline]
  __se_sys_sendmmsg net/socket.c:2768 [inline]
  __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768
  x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

CPU: 0 UID: 0 PID: 5460 Comm: syz.2.33 Not tainted 6.12.0-rc2-syzkaller-00006-g87d6aab2389e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024</Note>
    </Notes>
    <CVE>CVE-2024-50033</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50033.html</URL>
        <Description>CVE-2024-50033</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231914</URL>
        <Description>SUSE Bug 1231914</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="117">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ppp: fix ppp_async_encode() illegal access

syzbot reported an issue in ppp_async_encode() [1]

In this case, pppoe_sendmsg() is called with a zero size.
Then ppp_async_encode() is called with an empty skb.

BUG: KMSAN: uninit-value in ppp_async_encode drivers/net/ppp/ppp_async.c:545 [inline]
 BUG: KMSAN: uninit-value in ppp_async_push+0xb4f/0x2660 drivers/net/ppp/ppp_async.c:675
  ppp_async_encode drivers/net/ppp/ppp_async.c:545 [inline]
  ppp_async_push+0xb4f/0x2660 drivers/net/ppp/ppp_async.c:675
  ppp_async_send+0x130/0x1b0 drivers/net/ppp/ppp_async.c:634
  ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2280 [inline]
  ppp_input+0x1f1/0xe60 drivers/net/ppp/ppp_generic.c:2304
  pppoe_rcv_core+0x1d3/0x720 drivers/net/ppp/pppoe.c:379
  sk_backlog_rcv+0x13b/0x420 include/net/sock.h:1113
  __release_sock+0x1da/0x330 net/core/sock.c:3072
  release_sock+0x6b/0x250 net/core/sock.c:3626
  pppoe_sendmsg+0x2b8/0xb90 drivers/net/ppp/pppoe.c:903
  sock_sendmsg_nosec net/socket.c:729 [inline]
  __sock_sendmsg+0x30f/0x380 net/socket.c:744
  ____sys_sendmsg+0x903/0xb60 net/socket.c:2602
  ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656
  __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742
  __do_sys_sendmmsg net/socket.c:2771 [inline]
  __se_sys_sendmmsg net/socket.c:2768 [inline]
  __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768
  x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Uninit was created at:
  slab_post_alloc_hook mm/slub.c:4092 [inline]
  slab_alloc_node mm/slub.c:4135 [inline]
  kmem_cache_alloc_node_noprof+0x6bf/0xb80 mm/slub.c:4187
  kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:587
  __alloc_skb+0x363/0x7b0 net/core/skbuff.c:678
  alloc_skb include/linux/skbuff.h:1322 [inline]
  sock_wmalloc+0xfe/0x1a0 net/core/sock.c:2732
  pppoe_sendmsg+0x3a7/0xb90 drivers/net/ppp/pppoe.c:867
  sock_sendmsg_nosec net/socket.c:729 [inline]
  __sock_sendmsg+0x30f/0x380 net/socket.c:744
  ____sys_sendmsg+0x903/0xb60 net/socket.c:2602
  ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656
  __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742
  __do_sys_sendmmsg net/socket.c:2771 [inline]
  __se_sys_sendmmsg net/socket.c:2768 [inline]
  __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768
  x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

CPU: 1 UID: 0 PID: 5411 Comm: syz.1.14 Not tainted 6.12.0-rc1-syzkaller-00165-g360c1f1f24c6 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024</Note>
    </Notes>
    <CVE>CVE-2024-50035</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50035.html</URL>
        <Description>CVE-2024-50035</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232392</URL>
        <Description>SUSE Bug 1232392</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="118">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: br_netfilter: fix panic with metadata_dst skb

Fix a kernel panic in the br_netfilter module when sending untagged
traffic via a VxLAN device.
This happens during the check for fragmentation in br_nf_dev_queue_xmit.

It is dependent on:
1) the br_netfilter module being loaded;
2) net.bridge.bridge-nf-call-iptables set to 1;
3) a bridge with a VxLAN (single-vxlan-device) netdevice as a bridge port;
4) untagged frames with size higher than the VxLAN MTU forwarded/flooded

When forwarding the untagged packet to the VxLAN bridge port, before
the netfilter hooks are called, br_handle_egress_vlan_tunnel is called and
changes the skb_dst to the tunnel dst. The tunnel_dst is a metadata type
of dst, i.e., skb_valid_dst(skb) is false, and metadata-&gt;dst.dev is NULL.

Then in the br_netfilter hooks, in br_nf_dev_queue_xmit, there's a check
for frames that needs to be fragmented: frames with higher MTU than the
VxLAN device end up calling br_nf_ip_fragment, which in turns call
ip_skb_dst_mtu.

The ip_dst_mtu tries to use the skb_dst(skb) as if it was a valid dst
with valid dst-&gt;dev, thus the crash.

This case was never supported in the first place, so drop the packet
instead.

PING 10.0.0.2 (10.0.0.2) from 0.0.0.0 h1-eth0: 2000(2028) bytes of data.
[  176.291791] Unable to handle kernel NULL pointer dereference at
virtual address 0000000000000110
[  176.292101] Mem abort info:
[  176.292184]   ESR = 0x0000000096000004
[  176.292322]   EC = 0x25: DABT (current EL), IL = 32 bits
[  176.292530]   SET = 0, FnV = 0
[  176.292709]   EA = 0, S1PTW = 0
[  176.292862]   FSC = 0x04: level 0 translation fault
[  176.293013] Data abort info:
[  176.293104]   ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
[  176.293488]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[  176.293787]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[  176.293995] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000043ef5000
[  176.294166] [0000000000000110] pgd=0000000000000000,
p4d=0000000000000000
[  176.294827] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[  176.295252] Modules linked in: vxlan ip6_udp_tunnel udp_tunnel veth
br_netfilter bridge stp llc ipv6 crct10dif_ce
[  176.295923] CPU: 0 PID: 188 Comm: ping Not tainted
6.8.0-rc3-g5b3fbd61b9d1 #2
[  176.296314] Hardware name: linux,dummy-virt (DT)
[  176.296535] pstate: 80000005 (Nzcv daif -PAN -UAO -TCO -DIT -SSBS
BTYPE=--)
[  176.296808] pc : br_nf_dev_queue_xmit+0x390/0x4ec [br_netfilter]
[  176.297382] lr : br_nf_dev_queue_xmit+0x2ac/0x4ec [br_netfilter]
[  176.297636] sp : ffff800080003630
[  176.297743] x29: ffff800080003630 x28: 0000000000000008 x27:
ffff6828c49ad9f8
[  176.298093] x26: ffff6828c49ad000 x25: 0000000000000000 x24:
00000000000003e8
[  176.298430] x23: 0000000000000000 x22: ffff6828c4960b40 x21:
ffff6828c3b16d28
[  176.298652] x20: ffff6828c3167048 x19: ffff6828c3b16d00 x18:
0000000000000014
[  176.298926] x17: ffffb0476322f000 x16: ffffb7e164023730 x15:
0000000095744632
[  176.299296] x14: ffff6828c3f1c880 x13: 0000000000000002 x12:
ffffb7e137926a70
[  176.299574] x11: 0000000000000001 x10: ffff6828c3f1c898 x9 :
0000000000000000
[  176.300049] x8 : ffff6828c49bf070 x7 : 0008460f18d5f20e x6 :
f20e0100bebafeca
[  176.300302] x5 : ffff6828c7f918fe x4 : ffff6828c49bf070 x3 :
0000000000000000
[  176.300586] x2 : 0000000000000000 x1 : ffff6828c3c7ad00 x0 :
ffff6828c7f918f0
[  176.300889] Call trace:
[  176.301123]  br_nf_dev_queue_xmit+0x390/0x4ec [br_netfilter]
[  176.301411]  br_nf_post_routing+0x2a8/0x3e4 [br_netfilter]
[  176.301703]  nf_hook_slow+0x48/0x124
[  176.302060]  br_forward_finish+0xc8/0xe8 [bridge]
[  176.302371]  br_nf_hook_thresh+0x124/0x134 [br_netfilter]
[  176.302605]  br_nf_forward_finish+0x118/0x22c [br_netfilter]
[  176.302824]  br_nf_forward_ip.part.0+0x264/0x290 [br_netfilter]
[  176.303136]  br_nf_forward+0x2b8/0x4e0 [br_netfilter]
[  176.303359]  nf_hook_slow+0x48/0x124
[  176.303
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-50045</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50045.html</URL>
        <Description>CVE-2024-50045</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231903</URL>
        <Description>SUSE Bug 1231903</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="119">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix UAF in async decryption

Doing an async decryption (large read) crashes with a
slab-use-after-free way down in the crypto API.

Reproducer:
    # mount.cifs -o ...,seal,esize=1 //srv/share /mnt
    # dd if=/mnt/largefile of=/dev/null
    ...
    [  194.196391] ==================================================================
    [  194.196844] BUG: KASAN: slab-use-after-free in gf128mul_4k_lle+0xc1/0x110
    [  194.197269] Read of size 8 at addr ffff888112bd0448 by task kworker/u77:2/899
    [  194.197707]
    [  194.197818] CPU: 12 UID: 0 PID: 899 Comm: kworker/u77:2 Not tainted 6.11.0-lku-00028-gfca3ca14a17a-dirty #43
    [  194.198400] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.2-3-gd478f380-prebuilt.qemu.org 04/01/2014
    [  194.199046] Workqueue: smb3decryptd smb2_decrypt_offload [cifs]
    [  194.200032] Call Trace:
    [  194.200191]  &lt;TASK&gt;
    [  194.200327]  dump_stack_lvl+0x4e/0x70
    [  194.200558]  ? gf128mul_4k_lle+0xc1/0x110
    [  194.200809]  print_report+0x174/0x505
    [  194.201040]  ? __pfx__raw_spin_lock_irqsave+0x10/0x10
    [  194.201352]  ? srso_return_thunk+0x5/0x5f
    [  194.201604]  ? __virt_addr_valid+0xdf/0x1c0
    [  194.201868]  ? gf128mul_4k_lle+0xc1/0x110
    [  194.202128]  kasan_report+0xc8/0x150
    [  194.202361]  ? gf128mul_4k_lle+0xc1/0x110
    [  194.202616]  gf128mul_4k_lle+0xc1/0x110
    [  194.202863]  ghash_update+0x184/0x210
    [  194.203103]  shash_ahash_update+0x184/0x2a0
    [  194.203377]  ? __pfx_shash_ahash_update+0x10/0x10
    [  194.203651]  ? srso_return_thunk+0x5/0x5f
    [  194.203877]  ? crypto_gcm_init_common+0x1ba/0x340
    [  194.204142]  gcm_hash_assoc_remain_continue+0x10a/0x140
    [  194.204434]  crypt_message+0xec1/0x10a0 [cifs]
    [  194.206489]  ? __pfx_crypt_message+0x10/0x10 [cifs]
    [  194.208507]  ? srso_return_thunk+0x5/0x5f
    [  194.209205]  ? srso_return_thunk+0x5/0x5f
    [  194.209925]  ? srso_return_thunk+0x5/0x5f
    [  194.210443]  ? srso_return_thunk+0x5/0x5f
    [  194.211037]  decrypt_raw_data+0x15f/0x250 [cifs]
    [  194.212906]  ? __pfx_decrypt_raw_data+0x10/0x10 [cifs]
    [  194.214670]  ? srso_return_thunk+0x5/0x5f
    [  194.215193]  smb2_decrypt_offload+0x12a/0x6c0 [cifs]

This is because TFM is being used in parallel.

Fix this by allocating a new AEAD TFM for async decryption, but keep
the existing one for synchronous READ cases (similar to what is done
in smb3_calc_signature()).

Also remove the calls to aead_request_set_callback() and
crypto_wait_req() since it's always going to be a synchronous operation.</Note>
    </Notes>
    <CVE>CVE-2024-50047</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50047.html</URL>
        <Description>CVE-2024-50047</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232418</URL>
        <Description>SUSE Bug 1232418</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232576</URL>
        <Description>SUSE Bug 1232576</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232638</URL>
        <Description>SUSE Bug 1232638</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="120">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

serial: protect uart_port_dtr_rts() in uart_shutdown() too

Commit af224ca2df29 (serial: core: Prevent unsafe uart port access, part
3) added few uport == NULL checks. It added one to uart_shutdown(), so
the commit assumes, uport can be NULL in there. But right after that
protection, there is an unprotected "uart_port_dtr_rts(uport, false);"
call. That is invoked only if HUPCL is set, so I assume that is the
reason why we do not see lots of these reports.

Or it cannot be NULL at this point at all for some reason :P.

Until the above is investigated, stay on the safe side and move this
dereference to the if too.

I got this inconsistency from Coverity under CID 1585130. Thanks.</Note>
    </Notes>
    <CVE>CVE-2024-50058</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.234.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.234.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_234-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50058.html</URL>
        <Description>CVE-2024-50058</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232285</URL>
        <Description>SUSE Bug 1232285</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
