<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:4367-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-12-17T17:59:49Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-12-17T17:59:49Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-12-17T17:59:49Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-48853: swiotlb: fix info leak with DMA_FROM_DEVICE (bsc#1228015).
- CVE-2024-26801: Bluetooth: Avoid potential use-after-free in hci_error_reset (bsc#1222413).
- CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223057).
- CVE-2024-26886: Bluetooth: af_bluetooth: Fix deadlock (bsc#1223044).
- CVE-2024-27051: cpufreq: brcmstb-avs-cpufreq: add check for cpufreq_cpu_get's return value (bsc#1223769).
- CVE-2024-35937: wifi: cfg80211: check A-MSDU format more carefully (bsc#1224526).
- CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (bsc#1225742).
- CVE-2024-42098: crypto: ecdh - explicitly zeroize private_key (bsc#1228779).
- CVE-2024-42229: crypto: aead,cipher - zeroize key buffer after use (bsc#1228708).
- CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231).
- CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230429).
- CVE-2024-46771: can: bcm: Remove proc entry when dev is unregistered (bsc#1230766).
- CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773).
- CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827).
- CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439).
- CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&amp;iput() (bsc#1231930).
- CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath the filesystem (bsc#1231920).
- CVE-2024-49858: efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption (bsc#1232251).
- CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion (bsc#1232272).
- CVE-2024-49921: drm/amd/display: Check null pointers before used (bsc#1232371).
- CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224)
- CVE-2024-49938: wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit (bsc#1232552).
- CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165).
- CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159).
- CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption (bsc#1232157).
- CVE-2024-50044: Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change (bsc#1231904).
- CVE-2024-50055: driver core: bus: Fix double free in driver API bus_register() (bsc#1232329).
- CVE-2024-50073: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux (bsc#1232520).
- CVE-2024-50074: parport: Proper fix for array out-of-bounds access (bsc#1232507).
- CVE-2024-50095: RDMA/mad: Improve handling of timed out WRs of mad agent (bsc#1232873).
- CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919).
- CVE-2024-50117: drm/amd: Guard against bad data for ATIF ACPI method (bsc#1232897).
- CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
- CVE-2024-50135: nvme-pci: fix race condition between reset and nvme_dev_disable() (bsc#1232888).
- CVE-2024-50148: Bluetooth: bnep: fix wild-memory-access in proto_unregister (bsc#1233063).
- CVE-2024-50150: usb: typec: altmode should keep reference to parent (bsc#1233051).
- CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233070).
- CVE-2024-50167: be2net: fix potential memory leak in be_xmit() (bsc#1233049).
- CVE-2024-50171: net: systemport: fix potential memory leak in bcm_sysport_xmit() (bsc#1233057).
- CVE-2024-50183: scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV instance (bsc#1233130).
- CVE-2024-50187: drm/vc4: Stop the active perfmon before being destroyed (bsc#1233108).
- CVE-2024-50195: posix-clock: Fix missing timespec64 check in pc_clock_settime() (bsc#1233103).
- CVE-2024-50218: ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow (bsc#1233191).
- CVE-2024-50234: wifi: iwlegacy: Clear stale interrupts before resuming device (bsc#1233211).
- CVE-2024-50236: wifi: ath10k: Fix memory leak in management tx (bsc#1233212).
- CVE-2024-50237: wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower (bsc#1233216).
- CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk-&gt;trans (bsc#1233453).
- CVE-2024-50265: ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() (bsc#1233454).
- CVE-2024-50267: usb: serial: io_edgeport: fix use after free in debug printk (bsc#1233456).
- CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from the list (bsc#1233462).
- CVE-2024-50278: dm cache: fix potential out-of-bounds access on the first resume (bsc#1233467).
- CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468).
- CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).
- CVE-2024-50290: media: cx24116: prevent overflows on SNR calculus (bsc#1233479).
- CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver (bsc#1233485).
- CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission (bsc#1233490).
- CVE-2024-50302: HID: core: zero-initialize the report buffer (bsc#1233491).
- CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data (bsc#1233552).
- CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555).
- CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access (bsc#1233557).
- CVE-2024-53066: nfs: Fix KMSAN warning in decode_getfattr_attrs() (bsc#1233560).
- CVE-2024-53085: tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 bsc#1233577).
- CVE-2024-53088: i40e: fix race condition by adding filter's intermediate sync state (bsc#1233580).
- CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).
- CVE-2024-53114: x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client (bsc#1234072).

The following non-security bugs were fixed:

- drm/vc4: Warn if some v3d code is run on BCM2711 (bsc#1233108).
- initramfs: avoid filename buffer overrun (bsc#1232436).
- kernel-binary: Enable livepatch package only when livepatch is enabled (bsc#1218644).
- lpfc: size cpu map by last cpu id set (bsc#1157160).
- net: relax socket state check at accept time (git-fixes).
- ocfs2: uncache inode which has failed entering the group (bsc#1234087).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Image SLES12-SP5-Azure-BYOS-2024-4367,Image SLES12-SP5-Azure-HPC-BYOS-2024-4367,Image SLES12-SP5-Azure-SAP-BYOS-2024-4367,Image SLES12-SP5-Azure-SAP-On-Demand-2024-4367,Image SLES12-SP5-EC2-BYOS-2024-4367,Image SLES12-SP5-EC2-ECS-On-Demand-2024-4367,Image SLES12-SP5-EC2-On-Demand-2024-4367,Image SLES12-SP5-EC2-SAP-BYOS-2024-4367,Image SLES12-SP5-EC2-SAP-On-Demand-2024-4367,Image SLES12-SP5-GCE-BYOS-2024-4367,Image SLES12-SP5-GCE-On-Demand-2024-4367,Image SLES12-SP5-GCE-SAP-BYOS-2024-4367,Image SLES12-SP5-GCE-SAP-On-Demand-2024-4367,Image SLES12-SP5-SAP-Azure-LI-BYOS-Production-2024-4367,Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production-2024-4367,SUSE-2024-4367,SUSE-SLE-HA-12-SP5-2024-4367,SUSE-SLE-Live-Patching-12-SP5-2024-4367,SUSE-SLE-SERVER-12-SP5-LTSS-2024-4367,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4367</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      <Description>Link for SUSE-SU-2024:4367-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:4367-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1082555</URL>
      <Description>SUSE Bug 1082555</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1157160</URL>
      <Description>SUSE Bug 1157160</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218644</URL>
      <Description>SUSE Bug 1218644</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221977</URL>
      <Description>SUSE Bug 1221977</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222364</URL>
      <Description>SUSE Bug 1222364</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222413</URL>
      <Description>SUSE Bug 1222413</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223044</URL>
      <Description>SUSE Bug 1223044</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223057</URL>
      <Description>SUSE Bug 1223057</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223769</URL>
      <Description>SUSE Bug 1223769</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224526</URL>
      <Description>SUSE Bug 1224526</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225730</URL>
      <Description>SUSE Bug 1225730</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225742</URL>
      <Description>SUSE Bug 1225742</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225764</URL>
      <Description>SUSE Bug 1225764</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228015</URL>
      <Description>SUSE Bug 1228015</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228650</URL>
      <Description>SUSE Bug 1228650</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228708</URL>
      <Description>SUSE Bug 1228708</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228779</URL>
      <Description>SUSE Bug 1228779</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230231</URL>
      <Description>SUSE Bug 1230231</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230429</URL>
      <Description>SUSE Bug 1230429</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230766</URL>
      <Description>SUSE Bug 1230766</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230773</URL>
      <Description>SUSE Bug 1230773</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230784</URL>
      <Description>SUSE Bug 1230784</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230827</URL>
      <Description>SUSE Bug 1230827</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231184</URL>
      <Description>SUSE Bug 1231184</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231439</URL>
      <Description>SUSE Bug 1231439</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231904</URL>
      <Description>SUSE Bug 1231904</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231920</URL>
      <Description>SUSE Bug 1231920</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231930</URL>
      <Description>SUSE Bug 1231930</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232157</URL>
      <Description>SUSE Bug 1232157</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232159</URL>
      <Description>SUSE Bug 1232159</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232165</URL>
      <Description>SUSE Bug 1232165</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232198</URL>
      <Description>SUSE Bug 1232198</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232201</URL>
      <Description>SUSE Bug 1232201</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232224</URL>
      <Description>SUSE Bug 1232224</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232251</URL>
      <Description>SUSE Bug 1232251</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232272</URL>
      <Description>SUSE Bug 1232272</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232329</URL>
      <Description>SUSE Bug 1232329</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232371</URL>
      <Description>SUSE Bug 1232371</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232436</URL>
      <Description>SUSE Bug 1232436</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232507</URL>
      <Description>SUSE Bug 1232507</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232520</URL>
      <Description>SUSE Bug 1232520</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232552</URL>
      <Description>SUSE Bug 1232552</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232873</URL>
      <Description>SUSE Bug 1232873</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232887</URL>
      <Description>SUSE Bug 1232887</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232888</URL>
      <Description>SUSE Bug 1232888</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232897</URL>
      <Description>SUSE Bug 1232897</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232919</URL>
      <Description>SUSE Bug 1232919</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232928</URL>
      <Description>SUSE Bug 1232928</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233049</URL>
      <Description>SUSE Bug 1233049</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233051</URL>
      <Description>SUSE Bug 1233051</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233057</URL>
      <Description>SUSE Bug 1233057</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233063</URL>
      <Description>SUSE Bug 1233063</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233070</URL>
      <Description>SUSE Bug 1233070</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233097</URL>
      <Description>SUSE Bug 1233097</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233103</URL>
      <Description>SUSE Bug 1233103</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233108</URL>
      <Description>SUSE Bug 1233108</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233111</URL>
      <Description>SUSE Bug 1233111</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233123</URL>
      <Description>SUSE Bug 1233123</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233130</URL>
      <Description>SUSE Bug 1233130</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233191</URL>
      <Description>SUSE Bug 1233191</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233211</URL>
      <Description>SUSE Bug 1233211</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233212</URL>
      <Description>SUSE Bug 1233212</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233216</URL>
      <Description>SUSE Bug 1233216</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233453</URL>
      <Description>SUSE Bug 1233453</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233454</URL>
      <Description>SUSE Bug 1233454</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233456</URL>
      <Description>SUSE Bug 1233456</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233462</URL>
      <Description>SUSE Bug 1233462</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233467</URL>
      <Description>SUSE Bug 1233467</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233468</URL>
      <Description>SUSE Bug 1233468</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233478</URL>
      <Description>SUSE Bug 1233478</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233479</URL>
      <Description>SUSE Bug 1233479</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233485</URL>
      <Description>SUSE Bug 1233485</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233490</URL>
      <Description>SUSE Bug 1233490</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233491</URL>
      <Description>SUSE Bug 1233491</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233552</URL>
      <Description>SUSE Bug 1233552</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233555</URL>
      <Description>SUSE Bug 1233555</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233557</URL>
      <Description>SUSE Bug 1233557</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233560</URL>
      <Description>SUSE Bug 1233560</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233577</URL>
      <Description>SUSE Bug 1233577</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233580</URL>
      <Description>SUSE Bug 1233580</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234025</URL>
      <Description>SUSE Bug 1234025</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234072</URL>
      <Description>SUSE Bug 1234072</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234087</URL>
      <Description>SUSE Bug 1234087</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47162/</URL>
      <Description>SUSE CVE CVE-2021-47162 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48853/</URL>
      <Description>SUSE CVE CVE-2022-48853 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26801/</URL>
      <Description>SUSE CVE CVE-2024-26801 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26852/</URL>
      <Description>SUSE CVE CVE-2024-26852 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26886/</URL>
      <Description>SUSE CVE CVE-2024-26886 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-27051/</URL>
      <Description>SUSE CVE CVE-2024-27051 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35937/</URL>
      <Description>SUSE CVE CVE-2024-35937 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36886/</URL>
      <Description>SUSE CVE CVE-2024-36886 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36905/</URL>
      <Description>SUSE CVE CVE-2024-36905 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36954/</URL>
      <Description>SUSE CVE CVE-2024-36954 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-42098/</URL>
      <Description>SUSE CVE CVE-2024-42098 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-42131/</URL>
      <Description>SUSE CVE CVE-2024-42131 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-42229/</URL>
      <Description>SUSE CVE CVE-2024-42229 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-44995/</URL>
      <Description>SUSE CVE CVE-2024-44995 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-45016/</URL>
      <Description>SUSE CVE CVE-2024-45016 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46771/</URL>
      <Description>SUSE CVE CVE-2024-46771 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46777/</URL>
      <Description>SUSE CVE CVE-2024-46777 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46800/</URL>
      <Description>SUSE CVE CVE-2024-46800 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47660/</URL>
      <Description>SUSE CVE CVE-2024-47660 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47679/</URL>
      <Description>SUSE CVE CVE-2024-47679 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47701/</URL>
      <Description>SUSE CVE CVE-2024-47701 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49858/</URL>
      <Description>SUSE CVE CVE-2024-49858 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49868/</URL>
      <Description>SUSE CVE CVE-2024-49868 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49884/</URL>
      <Description>SUSE CVE CVE-2024-49884 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49921/</URL>
      <Description>SUSE CVE CVE-2024-49921 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49925/</URL>
      <Description>SUSE CVE CVE-2024-49925 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49938/</URL>
      <Description>SUSE CVE CVE-2024-49938 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49945/</URL>
      <Description>SUSE CVE CVE-2024-49945 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49950/</URL>
      <Description>SUSE CVE CVE-2024-49950 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49952/</URL>
      <Description>SUSE CVE CVE-2024-49952 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50044/</URL>
      <Description>SUSE CVE CVE-2024-50044 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50055/</URL>
      <Description>SUSE CVE CVE-2024-50055 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50073/</URL>
      <Description>SUSE CVE CVE-2024-50073 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50074/</URL>
      <Description>SUSE CVE CVE-2024-50074 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50095/</URL>
      <Description>SUSE CVE CVE-2024-50095 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50099/</URL>
      <Description>SUSE CVE CVE-2024-50099 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50115/</URL>
      <Description>SUSE CVE CVE-2024-50115 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50117/</URL>
      <Description>SUSE CVE CVE-2024-50117 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50125/</URL>
      <Description>SUSE CVE CVE-2024-50125 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50135/</URL>
      <Description>SUSE CVE CVE-2024-50135 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50148/</URL>
      <Description>SUSE CVE CVE-2024-50148 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50150/</URL>
      <Description>SUSE CVE CVE-2024-50150 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50154/</URL>
      <Description>SUSE CVE CVE-2024-50154 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50167/</URL>
      <Description>SUSE CVE CVE-2024-50167 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50171/</URL>
      <Description>SUSE CVE CVE-2024-50171 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50179/</URL>
      <Description>SUSE CVE CVE-2024-50179 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50183/</URL>
      <Description>SUSE CVE CVE-2024-50183 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50187/</URL>
      <Description>SUSE CVE CVE-2024-50187 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50194/</URL>
      <Description>SUSE CVE CVE-2024-50194 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50195/</URL>
      <Description>SUSE CVE CVE-2024-50195 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50210/</URL>
      <Description>SUSE CVE CVE-2024-50210 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50218/</URL>
      <Description>SUSE CVE CVE-2024-50218 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50234/</URL>
      <Description>SUSE CVE CVE-2024-50234 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50236/</URL>
      <Description>SUSE CVE CVE-2024-50236 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50237/</URL>
      <Description>SUSE CVE CVE-2024-50237 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50264/</URL>
      <Description>SUSE CVE CVE-2024-50264 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50265/</URL>
      <Description>SUSE CVE CVE-2024-50265 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50267/</URL>
      <Description>SUSE CVE CVE-2024-50267 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50273/</URL>
      <Description>SUSE CVE CVE-2024-50273 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50278/</URL>
      <Description>SUSE CVE CVE-2024-50278 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50279/</URL>
      <Description>SUSE CVE CVE-2024-50279 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50289/</URL>
      <Description>SUSE CVE CVE-2024-50289 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50290/</URL>
      <Description>SUSE CVE CVE-2024-50290 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50296/</URL>
      <Description>SUSE CVE CVE-2024-50296 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50301/</URL>
      <Description>SUSE CVE CVE-2024-50301 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50302/</URL>
      <Description>SUSE CVE CVE-2024-50302 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53058/</URL>
      <Description>SUSE CVE CVE-2024-53058 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53061/</URL>
      <Description>SUSE CVE CVE-2024-53061 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53063/</URL>
      <Description>SUSE CVE CVE-2024-53063 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53066/</URL>
      <Description>SUSE CVE CVE-2024-53066 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53085/</URL>
      <Description>SUSE CVE CVE-2024-53085 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53088/</URL>
      <Description>SUSE CVE CVE-2024-53088 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53104/</URL>
      <Description>SUSE CVE CVE-2024-53104 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53114/</URL>
      <Description>SUSE CVE CVE-2024-53114 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53142/</URL>
      <Description>SUSE CVE CVE-2024-53142 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Image SLES12-SP5-Azure-BYOS">
      <Branch Type="Product Name" Name="Image SLES12-SP5-Azure-BYOS">
        <FullProductName ProductID="Image SLES12-SP5-Azure-BYOS">Image SLES12-SP5-Azure-BYOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-Azure-HPC-BYOS">
      <Branch Type="Product Name" Name="Image SLES12-SP5-Azure-HPC-BYOS">
        <FullProductName ProductID="Image SLES12-SP5-Azure-HPC-BYOS">Image SLES12-SP5-Azure-HPC-BYOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-Azure-SAP-BYOS">
      <Branch Type="Product Name" Name="Image SLES12-SP5-Azure-SAP-BYOS">
        <FullProductName ProductID="Image SLES12-SP5-Azure-SAP-BYOS">Image SLES12-SP5-Azure-SAP-BYOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-Azure-SAP-On-Demand">
      <Branch Type="Product Name" Name="Image SLES12-SP5-Azure-SAP-On-Demand">
        <FullProductName ProductID="Image SLES12-SP5-Azure-SAP-On-Demand">Image SLES12-SP5-Azure-SAP-On-Demand</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-EC2-BYOS">
      <Branch Type="Product Name" Name="Image SLES12-SP5-EC2-BYOS">
        <FullProductName ProductID="Image SLES12-SP5-EC2-BYOS">Image SLES12-SP5-EC2-BYOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-EC2-ECS-On-Demand">
      <Branch Type="Product Name" Name="Image SLES12-SP5-EC2-ECS-On-Demand">
        <FullProductName ProductID="Image SLES12-SP5-EC2-ECS-On-Demand">Image SLES12-SP5-EC2-ECS-On-Demand</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-EC2-On-Demand">
      <Branch Type="Product Name" Name="Image SLES12-SP5-EC2-On-Demand">
        <FullProductName ProductID="Image SLES12-SP5-EC2-On-Demand">Image SLES12-SP5-EC2-On-Demand</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-EC2-SAP-BYOS">
      <Branch Type="Product Name" Name="Image SLES12-SP5-EC2-SAP-BYOS">
        <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-BYOS">Image SLES12-SP5-EC2-SAP-BYOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-EC2-SAP-On-Demand">
      <Branch Type="Product Name" Name="Image SLES12-SP5-EC2-SAP-On-Demand">
        <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-On-Demand">Image SLES12-SP5-EC2-SAP-On-Demand</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-GCE-BYOS">
      <Branch Type="Product Name" Name="Image SLES12-SP5-GCE-BYOS">
        <FullProductName ProductID="Image SLES12-SP5-GCE-BYOS">Image SLES12-SP5-GCE-BYOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-GCE-On-Demand">
      <Branch Type="Product Name" Name="Image SLES12-SP5-GCE-On-Demand">
        <FullProductName ProductID="Image SLES12-SP5-GCE-On-Demand">Image SLES12-SP5-GCE-On-Demand</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-GCE-SAP-BYOS">
      <Branch Type="Product Name" Name="Image SLES12-SP5-GCE-SAP-BYOS">
        <FullProductName ProductID="Image SLES12-SP5-GCE-SAP-BYOS">Image SLES12-SP5-GCE-SAP-BYOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-GCE-SAP-On-Demand">
      <Branch Type="Product Name" Name="Image SLES12-SP5-GCE-SAP-On-Demand">
        <FullProductName ProductID="Image SLES12-SP5-GCE-SAP-On-Demand">Image SLES12-SP5-GCE-SAP-On-Demand</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">
      <Branch Type="Product Name" Name="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">
        <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">Image SLES12-SP5-SAP-Azure-LI-BYOS-Production</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">
      <Branch Type="Product Name" Name="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">
        <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Live Patching 12 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Live Patching 12 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12 SP5" CPE="cpe:/o:suse:sle-live-patching:12:sp5">SUSE Linux Enterprise Live Patching 12 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-4.12.14-122.237.1">
      <FullProductName ProductID="kernel-default-4.12.14-122.237.1">kernel-default-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cluster-md-kmp-default-4.12.14-122.237.1">
      <FullProductName ProductID="cluster-md-kmp-default-4.12.14-122.237.1">cluster-md-kmp-default-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dlm-kmp-default-4.12.14-122.237.1">
      <FullProductName ProductID="dlm-kmp-default-4.12.14-122.237.1">dlm-kmp-default-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gfs2-kmp-default-4.12.14-122.237.1">
      <FullProductName ProductID="gfs2-kmp-default-4.12.14-122.237.1">gfs2-kmp-default-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ocfs2-kmp-default-4.12.14-122.237.1">
      <FullProductName ProductID="ocfs2-kmp-default-4.12.14-122.237.1">ocfs2-kmp-default-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-4.12.14-122.237.1">
      <FullProductName ProductID="kernel-debug-4.12.14-122.237.1">kernel-debug-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-base-4.12.14-122.237.1">
      <FullProductName ProductID="kernel-debug-base-4.12.14-122.237.1">kernel-debug-base-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-devel-4.12.14-122.237.1">
      <FullProductName ProductID="kernel-debug-devel-4.12.14-122.237.1">kernel-debug-devel-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-base-4.12.14-122.237.1">
      <FullProductName ProductID="kernel-default-base-4.12.14-122.237.1">kernel-default-base-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-devel-4.12.14-122.237.1">
      <FullProductName ProductID="kernel-default-devel-4.12.14-122.237.1">kernel-default-devel-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-extra-4.12.14-122.237.1">
      <FullProductName ProductID="kernel-default-extra-4.12.14-122.237.1">kernel-default-extra-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-kgraft-4.12.14-122.237.1">
      <FullProductName ProductID="kernel-default-kgraft-4.12.14-122.237.1">kernel-default-kgraft-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-kgraft-devel-4.12.14-122.237.1">
      <FullProductName ProductID="kernel-default-kgraft-devel-4.12.14-122.237.1">kernel-default-kgraft-devel-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-man-4.12.14-122.237.1">
      <FullProductName ProductID="kernel-default-man-4.12.14-122.237.1">kernel-default-man-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-4.12.14-122.237.1">
      <FullProductName ProductID="kernel-devel-4.12.14-122.237.1">kernel-devel-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-4.12.14-122.237.1">
      <FullProductName ProductID="kernel-docs-4.12.14-122.237.1">kernel-docs-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-html-4.12.14-122.237.1">
      <FullProductName ProductID="kernel-docs-html-4.12.14-122.237.1">kernel-docs-html-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-kvmsmall-4.12.14-122.237.1">
      <FullProductName ProductID="kernel-kvmsmall-4.12.14-122.237.1">kernel-kvmsmall-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-kvmsmall-base-4.12.14-122.237.1">
      <FullProductName ProductID="kernel-kvmsmall-base-4.12.14-122.237.1">kernel-kvmsmall-base-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-kvmsmall-devel-4.12.14-122.237.1">
      <FullProductName ProductID="kernel-kvmsmall-devel-4.12.14-122.237.1">kernel-kvmsmall-devel-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-macros-4.12.14-122.237.1">
      <FullProductName ProductID="kernel-macros-4.12.14-122.237.1">kernel-macros-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-build-4.12.14-122.237.1">
      <FullProductName ProductID="kernel-obs-build-4.12.14-122.237.1">kernel-obs-build-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-qa-4.12.14-122.237.1">
      <FullProductName ProductID="kernel-obs-qa-4.12.14-122.237.1">kernel-obs-qa-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-4.12.14-122.237.1">
      <FullProductName ProductID="kernel-source-4.12.14-122.237.1">kernel-source-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-vanilla-4.12.14-122.237.1">
      <FullProductName ProductID="kernel-source-vanilla-4.12.14-122.237.1">kernel-source-vanilla-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-4.12.14-122.237.1">
      <FullProductName ProductID="kernel-syms-4.12.14-122.237.1">kernel-syms-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-4.12.14-122.237.1">
      <FullProductName ProductID="kernel-vanilla-4.12.14-122.237.1">kernel-vanilla-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-base-4.12.14-122.237.1">
      <FullProductName ProductID="kernel-vanilla-base-4.12.14-122.237.1">kernel-vanilla-base-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-vanilla-devel-4.12.14-122.237.1">
      <FullProductName ProductID="kernel-vanilla-devel-4.12.14-122.237.1">kernel-vanilla-devel-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-zfcpdump-4.12.14-122.237.1">
      <FullProductName ProductID="kernel-zfcpdump-4.12.14-122.237.1">kernel-zfcpdump-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-zfcpdump-man-4.12.14-122.237.1">
      <FullProductName ProductID="kernel-zfcpdump-man-4.12.14-122.237.1">kernel-zfcpdump-man-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kgraft-patch-4_12_14-122_237-default-1-8.3.1">
      <FullProductName ProductID="kgraft-patch-4_12_14-122_237-default-1-8.3.1">kgraft-patch-4_12_14-122_237-default-1-8.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kselftests-kmp-default-4.12.14-122.237.1">
      <FullProductName ProductID="kselftests-kmp-default-4.12.14-122.237.1">kselftests-kmp-default-4.12.14-122.237.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1">kernel-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-Azure-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-HPC-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1">kernel-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-Azure-HPC-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1">cluster-md-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1">dlm-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1">gfs2-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1">kernel-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1">ocfs2-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1">cluster-md-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-Azure-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1">dlm-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-Azure-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1">gfs2-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-Azure-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1">kernel-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-Azure-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-Azure-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1">ocfs2-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-Azure-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1">kernel-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-EC2-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-ECS-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1">kernel-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-EC2-ECS-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1">kernel-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-EC2-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1">cluster-md-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-EC2-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1">dlm-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-EC2-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1">gfs2-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-EC2-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1">kernel-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-EC2-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1">ocfs2-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-EC2-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1">cluster-md-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1">dlm-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1">gfs2-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1">kernel-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1">ocfs2-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-GCE-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1">kernel-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-GCE-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-GCE-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1">kernel-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-GCE-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-GCE-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1">cluster-md-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-GCE-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1">dlm-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-GCE-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1">gfs2-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-GCE-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1">kernel-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-GCE-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1">ocfs2-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-GCE-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1">cluster-md-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-GCE-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1">dlm-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-GCE-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1">gfs2-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-GCE-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1">kernel-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-GCE-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1">ocfs2-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1">cluster-md-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1">dlm-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1">gfs2-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1">kernel-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1">ocfs2-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1">cluster-md-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1">dlm-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1">gfs2-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1">kernel-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-default-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1">ocfs2-kmp-default-4.12.14-122.237.1 as a component of Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-kgraft-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1">kernel-default-kgraft-4.12.14-122.237.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-kgraft-devel-4.12.14-122.237.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1">kernel-default-kgraft-devel-4.12.14-122.237.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kgraft-patch-4_12_14-122_237-default-1-8.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1">kgraft-patch-4_12_14-122_237-default-1-8.3.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tipc: skb_linearize the head skb when reassembling msgs

It's not a good idea to append the frag skb to a skb's frag_list if
the frag_list already has skbs from elsewhere, such as this skb was
created by pskb_copy() where the frag_list was cloned (all the skbs
in it were skb_get'ed) and shared by multiple skbs.

However, the new appended frag skb should have been only seen by the
current skb. Otherwise, it will cause use after free crashes as this
appended frag skb are seen by multiple skbs but it only got skb_get
called once.

The same thing happens with a skb updated by pskb_may_pull() with a
skb_cloned skb. Li Shuang has reported quite a few crashes caused
by this when doing testing over macvlan devices:

  [] kernel BUG at net/core/skbuff.c:1970!
  [] Call Trace:
  []  skb_clone+0x4d/0xb0
  []  macvlan_broadcast+0xd8/0x160 [macvlan]
  []  macvlan_process_broadcast+0x148/0x150 [macvlan]
  []  process_one_work+0x1a7/0x360
  []  worker_thread+0x30/0x390

  [] kernel BUG at mm/usercopy.c:102!
  [] Call Trace:
  []  __check_heap_object+0xd3/0x100
  []  __check_object_size+0xff/0x16b
  []  simple_copy_to_iter+0x1c/0x30
  []  __skb_datagram_iter+0x7d/0x310
  []  __skb_datagram_iter+0x2a5/0x310
  []  skb_copy_datagram_iter+0x3b/0x90
  []  tipc_recvmsg+0x14a/0x3a0 [tipc]
  []  ____sys_recvmsg+0x91/0x150
  []  ___sys_recvmsg+0x7b/0xc0

  [] kernel BUG at mm/slub.c:305!
  [] Call Trace:
  []  &lt;IRQ&gt;
  []  kmem_cache_free+0x3ff/0x400
  []  __netif_receive_skb_core+0x12c/0xc40
  []  ? kmem_cache_alloc+0x12e/0x270
  []  netif_receive_skb_internal+0x3d/0xb0
  []  ? get_rx_page_info+0x8e/0xa0 [be2net]
  []  be_poll+0x6ef/0xd00 [be2net]
  []  ? irq_exit+0x4f/0x100
  []  net_rx_action+0x149/0x3b0

  ...

This patch is to fix it by linearizing the head skb if it has frag_list
set in tipc_buf_append(). Note that we choose to do this before calling
skb_unshare(), as __skb_linearize() will avoid skb_copy(). Also, we can
not just drop the frag_list either as the early time.</Note>
    </Notes>
    <CVE>CVE-2021-47162</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47162.html</URL>
        <Description>CVE-2021-47162</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221977</URL>
        <Description>SUSE Bug 1221977</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

swiotlb: fix info leak with DMA_FROM_DEVICE

The problem I'm addressing was discovered by the LTP test covering
cve-2018-1000204.

A short description of what happens follows:
1) The test case issues a command code 00 (TEST UNIT READY) via the SG_IO
   interface with: dxfer_len == 524288, dxdfer_dir == SG_DXFER_FROM_DEV
   and a corresponding dxferp. The peculiar thing about this is that TUR
   is not reading from the device.
2) In sg_start_req() the invocation of blk_rq_map_user() effectively
   bounces the user-space buffer. As if the device was to transfer into
   it. Since commit a45b599ad808 ("scsi: sg: allocate with __GFP_ZERO in
   sg_build_indirect()") we make sure this first bounce buffer is
   allocated with GFP_ZERO.
3) For the rest of the story we keep ignoring that we have a TUR, so the
   device won't touch the buffer we prepare as if the we had a
   DMA_FROM_DEVICE type of situation. My setup uses a virtio-scsi device
   and the  buffer allocated by SG is mapped by the function
   virtqueue_add_split() which uses DMA_FROM_DEVICE for the "in" sgs (here
   scatter-gather and not scsi generics). This mapping involves bouncing
   via the swiotlb (we need swiotlb to do virtio in protected guest like
   s390 Secure Execution, or AMD SEV).
4) When the SCSI TUR is done, we first copy back the content of the second
   (that is swiotlb) bounce buffer (which most likely contains some
   previous IO data), to the first bounce buffer, which contains all
   zeros.  Then we copy back the content of the first bounce buffer to
   the user-space buffer.
5) The test case detects that the buffer, which it zero-initialized,
  ain't all zeros and fails.

One can argue that this is an swiotlb problem, because without swiotlb
we leak all zeros, and the swiotlb should be transparent in a sense that
it does not affect the outcome (if all other participants are well
behaved).

Copying the content of the original buffer into the swiotlb buffer is
the only way I can think of to make swiotlb transparent in such
scenarios. So let's do just that if in doubt, but allow the driver
to tell us that the whole mapped buffer is going to be overwritten,
in which case we can preserve the old behavior and avoid the performance
impact of the extra bounce.</Note>
    </Notes>
    <CVE>CVE-2022-48853</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48853.html</URL>
        <Description>CVE-2022-48853</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228015</URL>
        <Description>SUSE Bug 1228015</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Avoid potential use-after-free in hci_error_reset

While handling the HCI_EV_HARDWARE_ERROR event, if the underlying
BT controller is not responding, the GPIO reset mechanism would
free the hci_dev and lead to a use-after-free in hci_error_reset.

Here's the call trace observed on a ChromeOS device with Intel AX201:
   queue_work_on+0x3e/0x6c
   __hci_cmd_sync_sk+0x2ee/0x4c0 [bluetooth &lt;HASH:3b4a6&gt;]
   ? init_wait_entry+0x31/0x31
   __hci_cmd_sync+0x16/0x20 [bluetooth &lt;HASH:3b4a 6&gt;]
   hci_error_reset+0x4f/0xa4 [bluetooth &lt;HASH:3b4a 6&gt;]
   process_one_work+0x1d8/0x33f
   worker_thread+0x21b/0x373
   kthread+0x13a/0x152
   ? pr_cont_work+0x54/0x54
   ? kthread_blkcg+0x31/0x31
    ret_from_fork+0x1f/0x30

This patch holds the reference count on the hci_dev while processing
a HCI_EV_HARDWARE_ERROR event to avoid potential crash.</Note>
    </Notes>
    <CVE>CVE-2024-26801</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26801.html</URL>
        <Description>CVE-2024-26801</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222413</URL>
        <Description>SUSE Bug 1222413</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/ipv6: avoid possible UAF in ip6_route_mpath_notify()

syzbot found another use-after-free in ip6_route_mpath_notify() [1]

Commit f7225172f25a ("net/ipv6: prevent use after free in
ip6_route_mpath_notify") was not able to fix the root cause.

We need to defer the fib6_info_release() calls after
ip6_route_mpath_notify(), in the cleanup phase.

[1]
BUG: KASAN: slab-use-after-free in rt6_fill_node+0x1460/0x1ac0
Read of size 4 at addr ffff88809a07fc64 by task syz-executor.2/23037

CPU: 0 PID: 23037 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-01035-gea7f3cfaa588 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
Call Trace:
 &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:88 [inline]
  dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106
  print_address_description mm/kasan/report.c:377 [inline]
  print_report+0x167/0x540 mm/kasan/report.c:488
  kasan_report+0x142/0x180 mm/kasan/report.c:601
 rt6_fill_node+0x1460/0x1ac0
  inet6_rt_notify+0x13b/0x290 net/ipv6/route.c:6184
  ip6_route_mpath_notify net/ipv6/route.c:5198 [inline]
  ip6_route_multipath_add net/ipv6/route.c:5404 [inline]
  inet6_rtm_newroute+0x1d0f/0x2300 net/ipv6/route.c:5517
  rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6597
  netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543
  netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]
  netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367
  netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x221/0x270 net/socket.c:745
  ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584
  ___sys_sendmsg net/socket.c:2638 [inline]
  __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667
 do_syscall_64+0xf9/0x240
 entry_SYSCALL_64_after_hwframe+0x6f/0x77
RIP: 0033:0x7f73dd87dda9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f73de6550c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007f73dd9ac050 RCX: 00007f73dd87dda9
RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000005
RBP: 00007f73dd8ca47a R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000006e R14: 00007f73dd9ac050 R15: 00007ffdbdeb7858
 &lt;/TASK&gt;

Allocated by task 23037:
  kasan_save_stack mm/kasan/common.c:47 [inline]
  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
  poison_kmalloc_redzone mm/kasan/common.c:372 [inline]
  __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:389
  kasan_kmalloc include/linux/kasan.h:211 [inline]
  __do_kmalloc_node mm/slub.c:3981 [inline]
  __kmalloc+0x22e/0x490 mm/slub.c:3994
  kmalloc include/linux/slab.h:594 [inline]
  kzalloc include/linux/slab.h:711 [inline]
  fib6_info_alloc+0x2e/0xf0 net/ipv6/ip6_fib.c:155
  ip6_route_info_create+0x445/0x12b0 net/ipv6/route.c:3758
  ip6_route_multipath_add net/ipv6/route.c:5298 [inline]
  inet6_rtm_newroute+0x744/0x2300 net/ipv6/route.c:5517
  rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6597
  netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543
  netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]
  netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367
  netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x221/0x270 net/socket.c:745
  ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584
  ___sys_sendmsg net/socket.c:2638 [inline]
  __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667
 do_syscall_64+0xf9/0x240
 entry_SYSCALL_64_after_hwframe+0x6f/0x77

Freed by task 16:
  kasan_save_stack mm/kasan/common.c:47 [inline]
  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
  kasan_save_free_info+0x4e/0x60 mm/kasan/generic.c:640
  poison_slab_object+0xa6/0xe0 m
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-26852</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26852.html</URL>
        <Description>CVE-2024-26852</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223057</URL>
        <Description>SUSE Bug 1223057</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223059</URL>
        <Description>SUSE Bug 1223059</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: af_bluetooth: Fix deadlock

Attemting to do sock_lock on .recvmsg may cause a deadlock as shown
bellow, so instead of using sock_sock this uses sk_receive_queue.lock
on bt_sock_ioctl to avoid the UAF:

INFO: task kworker/u9:1:121 blocked for more than 30 seconds.
      Not tainted 6.7.6-lemon #183
Workqueue: hci0 hci_rx_work
Call Trace:
 &lt;TASK&gt;
 __schedule+0x37d/0xa00
 schedule+0x32/0xe0
 __lock_sock+0x68/0xa0
 ? __pfx_autoremove_wake_function+0x10/0x10
 lock_sock_nested+0x43/0x50
 l2cap_sock_recv_cb+0x21/0xa0
 l2cap_recv_frame+0x55b/0x30a0
 ? psi_task_switch+0xeb/0x270
 ? finish_task_switch.isra.0+0x93/0x2a0
 hci_rx_work+0x33a/0x3f0
 process_one_work+0x13a/0x2f0
 worker_thread+0x2f0/0x410
 ? __pfx_worker_thread+0x10/0x10
 kthread+0xe0/0x110
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x2c/0x50
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1b/0x30
 &lt;/TASK&gt;</Note>
    </Notes>
    <CVE>CVE-2024-26886</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26886.html</URL>
        <Description>CVE-2024-26886</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223044</URL>
        <Description>SUSE Bug 1223044</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

cpufreq: brcmstb-avs-cpufreq: add check for cpufreq_cpu_get's return value

cpufreq_cpu_get may return NULL. To avoid NULL-dereference check it
and return 0 in case of error.

Found by Linux Verification Center (linuxtesting.org) with SVACE.</Note>
    </Notes>
    <CVE>CVE-2024-27051</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-27051.html</URL>
        <Description>CVE-2024-27051</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223769</URL>
        <Description>SUSE Bug 1223769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: check A-MSDU format more carefully

If it looks like there's another subframe in the A-MSDU
but the header isn't fully there, we can end up reading
data out of bounds, only to discard later. Make this a
bit more careful and check if the subframe header can
even be present.</Note>
    </Notes>
    <CVE>CVE-2024-35937</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35937.html</URL>
        <Description>CVE-2024-35937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224526</URL>
        <Description>SUSE Bug 1224526</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tipc: fix UAF in error path

Sam Page (sam4k) working with Trend Micro Zero Day Initiative reported
a UAF in the tipc_buf_append() error path:

BUG: KASAN: slab-use-after-free in kfree_skb_list_reason+0x47e/0x4c0
linux/net/core/skbuff.c:1183
Read of size 8 at addr ffff88804d2a7c80 by task poc/8034

CPU: 1 PID: 8034 Comm: poc Not tainted 6.8.2 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
1.16.0-debian-1.16.0-5 04/01/2014
Call Trace:
 &lt;IRQ&gt;
 __dump_stack linux/lib/dump_stack.c:88
 dump_stack_lvl+0xd9/0x1b0 linux/lib/dump_stack.c:106
 print_address_description linux/mm/kasan/report.c:377
 print_report+0xc4/0x620 linux/mm/kasan/report.c:488
 kasan_report+0xda/0x110 linux/mm/kasan/report.c:601
 kfree_skb_list_reason+0x47e/0x4c0 linux/net/core/skbuff.c:1183
 skb_release_data+0x5af/0x880 linux/net/core/skbuff.c:1026
 skb_release_all linux/net/core/skbuff.c:1094
 __kfree_skb linux/net/core/skbuff.c:1108
 kfree_skb_reason+0x12d/0x210 linux/net/core/skbuff.c:1144
 kfree_skb linux/./include/linux/skbuff.h:1244
 tipc_buf_append+0x425/0xb50 linux/net/tipc/msg.c:186
 tipc_link_input+0x224/0x7c0 linux/net/tipc/link.c:1324
 tipc_link_rcv+0x76e/0x2d70 linux/net/tipc/link.c:1824
 tipc_rcv+0x45f/0x10f0 linux/net/tipc/node.c:2159
 tipc_udp_recv+0x73b/0x8f0 linux/net/tipc/udp_media.c:390
 udp_queue_rcv_one_skb+0xad2/0x1850 linux/net/ipv4/udp.c:2108
 udp_queue_rcv_skb+0x131/0xb00 linux/net/ipv4/udp.c:2186
 udp_unicast_rcv_skb+0x165/0x3b0 linux/net/ipv4/udp.c:2346
 __udp4_lib_rcv+0x2594/0x3400 linux/net/ipv4/udp.c:2422
 ip_protocol_deliver_rcu+0x30c/0x4e0 linux/net/ipv4/ip_input.c:205
 ip_local_deliver_finish+0x2e4/0x520 linux/net/ipv4/ip_input.c:233
 NF_HOOK linux/./include/linux/netfilter.h:314
 NF_HOOK linux/./include/linux/netfilter.h:308
 ip_local_deliver+0x18e/0x1f0 linux/net/ipv4/ip_input.c:254
 dst_input linux/./include/net/dst.h:461
 ip_rcv_finish linux/net/ipv4/ip_input.c:449
 NF_HOOK linux/./include/linux/netfilter.h:314
 NF_HOOK linux/./include/linux/netfilter.h:308
 ip_rcv+0x2c5/0x5d0 linux/net/ipv4/ip_input.c:569
 __netif_receive_skb_one_core+0x199/0x1e0 linux/net/core/dev.c:5534
 __netif_receive_skb+0x1f/0x1c0 linux/net/core/dev.c:5648
 process_backlog+0x101/0x6b0 linux/net/core/dev.c:5976
 __napi_poll.constprop.0+0xba/0x550 linux/net/core/dev.c:6576
 napi_poll linux/net/core/dev.c:6645
 net_rx_action+0x95a/0xe90 linux/net/core/dev.c:6781
 __do_softirq+0x21f/0x8e7 linux/kernel/softirq.c:553
 do_softirq linux/kernel/softirq.c:454
 do_softirq+0xb2/0xf0 linux/kernel/softirq.c:441
 &lt;/IRQ&gt;
 &lt;TASK&gt;
 __local_bh_enable_ip+0x100/0x120 linux/kernel/softirq.c:381
 local_bh_enable linux/./include/linux/bottom_half.h:33
 rcu_read_unlock_bh linux/./include/linux/rcupdate.h:851
 __dev_queue_xmit+0x871/0x3ee0 linux/net/core/dev.c:4378
 dev_queue_xmit linux/./include/linux/netdevice.h:3169
 neigh_hh_output linux/./include/net/neighbour.h:526
 neigh_output linux/./include/net/neighbour.h:540
 ip_finish_output2+0x169f/0x2550 linux/net/ipv4/ip_output.c:235
 __ip_finish_output linux/net/ipv4/ip_output.c:313
 __ip_finish_output+0x49e/0x950 linux/net/ipv4/ip_output.c:295
 ip_finish_output+0x31/0x310 linux/net/ipv4/ip_output.c:323
 NF_HOOK_COND linux/./include/linux/netfilter.h:303
 ip_output+0x13b/0x2a0 linux/net/ipv4/ip_output.c:433
 dst_output linux/./include/net/dst.h:451
 ip_local_out linux/net/ipv4/ip_output.c:129
 ip_send_skb+0x3e5/0x560 linux/net/ipv4/ip_output.c:1492
 udp_send_skb+0x73f/0x1530 linux/net/ipv4/udp.c:963
 udp_sendmsg+0x1a36/0x2b40 linux/net/ipv4/udp.c:1250
 inet_sendmsg+0x105/0x140 linux/net/ipv4/af_inet.c:850
 sock_sendmsg_nosec linux/net/socket.c:730
 __sock_sendmsg linux/net/socket.c:745
 __sys_sendto+0x42c/0x4e0 linux/net/socket.c:2191
 __do_sys_sendto linux/net/socket.c:2203
 __se_sys_sendto linux/net/socket.c:2199
 __x64_sys_sendto+0xe0/0x1c0 linux/net/socket.c:2199
 do_syscall_x64 linux/arch/x86/entry/common.c:52
 do_syscall_
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-36886</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36886.html</URL>
        <Description>CVE-2024-36886</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225730</URL>
        <Description>SUSE Bug 1225730</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225742</URL>
        <Description>SUSE Bug 1225742</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets

TCP_SYN_RECV state is really special, it is only used by
cross-syn connections, mostly used by fuzzers.

In the following crash [1], syzbot managed to trigger a divide
by zero in tcp_rcv_space_adjust()

A socket makes the following state transitions,
without ever calling tcp_init_transfer(),
meaning tcp_init_buffer_space() is also not called.

         TCP_CLOSE
connect()
         TCP_SYN_SENT
         TCP_SYN_RECV
shutdown() -&gt; tcp_shutdown(sk, SEND_SHUTDOWN)
         TCP_FIN_WAIT1

To fix this issue, change tcp_shutdown() to not
perform a TCP_SYN_RECV -&gt; TCP_FIN_WAIT1 transition,
which makes no sense anyway.

When tcp_rcv_state_process() later changes socket state
from TCP_SYN_RECV to TCP_ESTABLISH, then look at
sk-&gt;sk_shutdown to finally enter TCP_FIN_WAIT1 state,
and send a FIN packet from a sane socket state.

This means tcp_send_fin() can now be called from BH
context, and must use GFP_ATOMIC allocations.

[1]
divide error: 0000 [#1] PREEMPT SMP KASAN NOPTI
CPU: 1 PID: 5084 Comm: syz-executor358 Not tainted 6.9.0-rc6-syzkaller-00022-g98369dccd2f8 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
 RIP: 0010:tcp_rcv_space_adjust+0x2df/0x890 net/ipv4/tcp_input.c:767
Code: e3 04 4c 01 eb 48 8b 44 24 38 0f b6 04 10 84 c0 49 89 d5 0f 85 a5 03 00 00 41 8b 8e c8 09 00 00 89 e8 29 c8 48 0f af c3 31 d2 &lt;48&gt; f7 f1 48 8d 1c 43 49 8d 96 76 08 00 00 48 89 d0 48 c1 e8 03 48
RSP: 0018:ffffc900031ef3f0 EFLAGS: 00010246
RAX: 0c677a10441f8f42 RBX: 000000004fb95e7e RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000027d4b11f R08: ffffffff89e535a4 R09: 1ffffffff25e6ab7
R10: dffffc0000000000 R11: ffffffff8135e920 R12: ffff88802a9f8d30
R13: dffffc0000000000 R14: ffff88802a9f8d00 R15: 1ffff1100553f2da
FS:  00005555775c0380(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f1155bf2304 CR3: 000000002b9f2000 CR4: 0000000000350ef0
Call Trace:
 &lt;TASK&gt;
  tcp_recvmsg_locked+0x106d/0x25a0 net/ipv4/tcp.c:2513
  tcp_recvmsg+0x25d/0x920 net/ipv4/tcp.c:2578
  inet6_recvmsg+0x16a/0x730 net/ipv6/af_inet6.c:680
  sock_recvmsg_nosec net/socket.c:1046 [inline]
  sock_recvmsg+0x109/0x280 net/socket.c:1068
  ____sys_recvmsg+0x1db/0x470 net/socket.c:2803
  ___sys_recvmsg net/socket.c:2845 [inline]
  do_recvmmsg+0x474/0xae0 net/socket.c:2939
  __sys_recvmmsg net/socket.c:3018 [inline]
  __do_sys_recvmmsg net/socket.c:3041 [inline]
  __se_sys_recvmmsg net/socket.c:3034 [inline]
  __x64_sys_recvmmsg+0x199/0x250 net/socket.c:3034
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7faeb6363db9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 c1 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffcc1997168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007faeb6363db9
RDX: 0000000000000001 RSI: 0000000020000bc0 RDI: 0000000000000005
RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000001c
R10: 0000000000000122 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000001</Note>
    </Notes>
    <CVE>CVE-2024-36905</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36905.html</URL>
        <Description>CVE-2024-36905</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225742</URL>
        <Description>SUSE Bug 1225742</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tipc: fix a possible memleak in tipc_buf_append

__skb_linearize() doesn't free the skb when it fails, so move
'*buf = NULL' after __skb_linearize(), so that the skb can be
freed on the err path.</Note>
    </Notes>
    <CVE>CVE-2024-36954</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36954.html</URL>
        <Description>CVE-2024-36954</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225764</URL>
        <Description>SUSE Bug 1225764</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

crypto: ecdh - explicitly zeroize private_key

private_key is overwritten with the key parameter passed in by the
caller (if present), or alternatively a newly generated private key.
However, it is possible that the caller provides a key (or the newly
generated key) which is shorter than the previous key. In that
scenario, some key material from the previous key would not be
overwritten. The easiest solution is to explicitly zeroize the entire
private_key array first.

Note that this patch slightly changes the behavior of this function:
previously, if the ecc_gen_privkey failed, the old private_key would
remain. Now, the private_key is always zeroized. This behavior is
consistent with the case where params.key is set and ecc_is_key_valid
fails.</Note>
    </Notes>
    <CVE>CVE-2024-42098</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-42098.html</URL>
        <Description>CVE-2024-42098</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228779</URL>
        <Description>SUSE Bug 1228779</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mm: avoid overflows in dirty throttling logic

The dirty throttling logic is interspersed with assumptions that dirty
limits in PAGE_SIZE units fit into 32-bit (so that various multiplications
fit into 64-bits).  If limits end up being larger, we will hit overflows,
possible divisions by 0 etc.  Fix these problems by never allowing so
large dirty limits as they have dubious practical value anyway.  For
dirty_bytes / dirty_background_bytes interfaces we can just refuse to set
so large limits.  For dirty_ratio / dirty_background_ratio it isn't so
simple as the dirty limit is computed from the amount of available memory
which can change due to memory hotplug etc.  So when converting dirty
limits from ratios to numbers of pages, we just don't allow the result to
exceed UINT_MAX.

This is root-only triggerable problem which occurs when the operator
sets dirty limits to &gt;16 TB.</Note>
    </Notes>
    <CVE>CVE-2024-42131</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-42131.html</URL>
        <Description>CVE-2024-42131</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228650</URL>
        <Description>SUSE Bug 1228650</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

crypto: aead,cipher - zeroize key buffer after use

I.G 9.7.B for FIPS 140-3 specifies that variables temporarily holding
cryptographic information should be zeroized once they are no longer
needed. Accomplish this by using kfree_sensitive for buffers that
previously held the private key.</Note>
    </Notes>
    <CVE>CVE-2024-42229</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-42229.html</URL>
        <Description>CVE-2024-42229</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228708</URL>
        <Description>SUSE Bug 1228708</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: hns3: fix a deadlock problem when config TC during resetting

When config TC during the reset process, may cause a deadlock, the flow is
as below:
                             pf reset start
                                 |
                                 ▼
                              ......
setup tc                         |
    |                            ▼
    ▼                      DOWN: napi_disable()
napi_disable()(skip)             |
    |                            |
    ▼                            ▼
  ......                      ......
    |                            |
    ▼                            |
napi_enable()                    |
                                 ▼
                           UINIT: netif_napi_del()
                                 |
                                 ▼
                              ......
                                 |
                                 ▼
                           INIT: netif_napi_add()
                                 |
                                 ▼
                              ......                 global reset start
                                 |                      |
                                 ▼                      ▼
                           UP: napi_enable()(skip)    ......
                                 |                      |
                                 ▼                      ▼
                              ......                 napi_disable()

In reset process, the driver will DOWN the port and then UINIT, in this
case, the setup tc process will UP the port before UINIT, so cause the
problem. Adds a DOWN process in UINIT to fix it.</Note>
    </Notes>
    <CVE>CVE-2024-44995</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-44995.html</URL>
        <Description>CVE-2024-44995</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230231</URL>
        <Description>SUSE Bug 1230231</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netem: fix return value if duplicate enqueue fails

There is a bug in netem_enqueue() introduced by
commit 5845f706388a ("net: netem: fix skb length BUG_ON in __skb_to_sgvec")
that can lead to a use-after-free.

This commit made netem_enqueue() always return NET_XMIT_SUCCESS
when a packet is duplicated, which can cause the parent qdisc's q.qlen
to be mistakenly incremented. When this happens qlen_notify() may be
skipped on the parent during destruction, leaving a dangling pointer
for some classful qdiscs like DRR.

There are two ways for the bug happen:

- If the duplicated packet is dropped by rootq-&gt;enqueue() and then
  the original packet is also dropped.
- If rootq-&gt;enqueue() sends the duplicated packet to a different qdisc
  and the original packet is dropped.

In both cases NET_XMIT_SUCCESS is returned even though no packets
are enqueued at the netem qdisc.

The fix is to defer the enqueue of the duplicate packet until after
the original packet has been guaranteed to return NET_XMIT_SUCCESS.</Note>
    </Notes>
    <CVE>CVE-2024-45016</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-45016.html</URL>
        <Description>CVE-2024-45016</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230429</URL>
        <Description>SUSE Bug 1230429</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230998</URL>
        <Description>SUSE Bug 1230998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

can: bcm: Remove proc entry when dev is unregistered.

syzkaller reported a warning in bcm_connect() below. [0]

The repro calls connect() to vxcan1, removes vxcan1, and calls
connect() with ifindex == 0.

Calling connect() for a BCM socket allocates a proc entry.
Then, bcm_sk(sk)-&gt;bound is set to 1 to prevent further connect().

However, removing the bound device resets bcm_sk(sk)-&gt;bound to 0
in bcm_notify().

The 2nd connect() tries to allocate a proc entry with the same
name and sets NULL to bcm_sk(sk)-&gt;bcm_proc_read, leaking the
original proc entry.

Since the proc entry is available only for connect()ed sockets,
let's clean up the entry when the bound netdev is unregistered.

[0]:
proc_dir_entry 'can-bcm/2456' already registered
WARNING: CPU: 1 PID: 394 at fs/proc/generic.c:376 proc_register+0x645/0x8f0 fs/proc/generic.c:375
Modules linked in:
CPU: 1 PID: 394 Comm: syz-executor403 Not tainted 6.10.0-rc7-g852e42cc2dd4
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
RIP: 0010:proc_register+0x645/0x8f0 fs/proc/generic.c:375
Code: 00 00 00 00 00 48 85 ed 0f 85 97 02 00 00 4d 85 f6 0f 85 9f 02 00 00 48 c7 c7 9b cb cf 87 48 89 de 4c 89 fa e8 1c 6f eb fe 90 &lt;0f&gt; 0b 90 90 48 c7 c7 98 37 99 89 e8 cb 7e 22 05 bb 00 00 00 10 48
RSP: 0018:ffa0000000cd7c30 EFLAGS: 00010246
RAX: 9e129be1950f0200 RBX: ff1100011b51582c RCX: ff1100011857cd80
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000002
RBP: 0000000000000000 R08: ffd400000000000f R09: ff1100013e78cac0
R10: ffac800000cd7980 R11: ff1100013e12b1f0 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: ff1100011a99a2ec
FS:  00007fbd7086f740(0000) GS:ff1100013fd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000200071c0 CR3: 0000000118556004 CR4: 0000000000771ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 proc_create_net_single+0x144/0x210 fs/proc/proc_net.c:220
 bcm_connect+0x472/0x840 net/can/bcm.c:1673
 __sys_connect_file net/socket.c:2049 [inline]
 __sys_connect+0x5d2/0x690 net/socket.c:2066
 __do_sys_connect net/socket.c:2076 [inline]
 __se_sys_connect net/socket.c:2073 [inline]
 __x64_sys_connect+0x8f/0x100 net/socket.c:2073
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xd9/0x1c0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x4b/0x53
RIP: 0033:0x7fbd708b0e5d
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 9f 1b 00 f7 d8 64 89 01 48
RSP: 002b:00007fff8cd33f08 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fbd708b0e5d
RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000003
RBP: 0000000000000000 R08: 0000000000000040 R09: 0000000000000040
R10: 0000000000000040 R11: 0000000000000246 R12: 00007fff8cd34098
R13: 0000000000401280 R14: 0000000000406de8 R15: 00007fbd70ab9000
 &lt;/TASK&gt;
remove_proc_entry: removing non-empty directory 'net/can-bcm', leaking at least '2456'</Note>
    </Notes>
    <CVE>CVE-2024-46771</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46771.html</URL>
        <Description>CVE-2024-46771</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230766</URL>
        <Description>SUSE Bug 1230766</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

udf: Avoid excessive partition lengths

Avoid mounting filesystems where the partition would overflow the
32-bits used for block number. Also refuse to mount filesystems where
the partition length is so large we cannot safely index bits in a
block bitmap.</Note>
    </Notes>
    <CVE>CVE-2024-46777</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46777.html</URL>
        <Description>CVE-2024-46777</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230773</URL>
        <Description>SUSE Bug 1230773</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

sch/netem: fix use after free in netem_dequeue

If netem_dequeue() enqueues packet to inner qdisc and that qdisc
returns __NET_XMIT_STOLEN. The packet is dropped but
qdisc_tree_reduce_backlog() is not called to update the parent's
q.qlen, leading to the similar use-after-free as Commit
e04991a48dbaf382 ("netem: fix return value if duplicate enqueue
fails")

Commands to trigger KASAN UaF:

ip link add type dummy
ip link set lo up
ip link set dummy0 up
tc qdisc add dev lo parent root handle 1: drr
tc filter add dev lo parent 1: basic classid 1:1
tc class add dev lo classid 1:1 drr
tc qdisc add dev lo parent 1:1 handle 2: netem
tc qdisc add dev lo parent 2: handle 3: drr
tc filter add dev lo parent 3: basic classid 3:1 action mirred egress
redirect dev dummy0
tc class add dev lo classid 3:1 drr
ping -c1 -W0.01 localhost # Trigger bug
tc class del dev lo classid 1:1
tc class add dev lo classid 1:1 drr
ping -c1 -W0.01 localhost # UaF</Note>
    </Notes>
    <CVE>CVE-2024-46800</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46800.html</URL>
        <Description>CVE-2024-46800</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230827</URL>
        <Description>SUSE Bug 1230827</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

fsnotify: clear PARENT_WATCHED flags lazily

In some setups directories can have many (usually negative) dentries.
Hence __fsnotify_update_child_dentry_flags() function can take a
significant amount of time. Since the bulk of this function happens
under inode-&gt;i_lock this causes a significant contention on the lock
when we remove the watch from the directory as the
__fsnotify_update_child_dentry_flags() call from fsnotify_recalc_mask()
races with __fsnotify_update_child_dentry_flags() calls from
__fsnotify_parent() happening on children. This can lead upto softlockup
reports reported by users.

Fix the problem by calling fsnotify_update_children_dentry_flags() to
set PARENT_WATCHED flags only when parent starts watching children.

When parent stops watching children, clear false positive PARENT_WATCHED
flags lazily in __fsnotify_parent() for each accessed child.</Note>
    </Notes>
    <CVE>CVE-2024-47660</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47660.html</URL>
        <Description>CVE-2024-47660</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231439</URL>
        <Description>SUSE Bug 1231439</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

vfs: fix race between evice_inodes() and find_inode()&amp;iput()

Hi, all

Recently I noticed a bug[1] in btrfs, after digged it into
and I believe it'a race in vfs.

Let's assume there's a inode (ie ino 261) with i_count 1 is
called by iput(), and there's a concurrent thread calling
generic_shutdown_super().

cpu0:                              cpu1:
iput() // i_count is 1
  -&gt;spin_lock(inode)
  -&gt;dec i_count to 0
  -&gt;iput_final()                    generic_shutdown_super()
    -&gt;__inode_add_lru()               -&gt;evict_inodes()
      // cause some reason[2]           -&gt;if (atomic_read(inode-&gt;i_count)) continue;
      // return before                  // inode 261 passed the above check
      // list_lru_add_obj()             // and then schedule out
   -&gt;spin_unlock()
// note here: the inode 261
// was still at sb list and hash list,
// and I_FREEING|I_WILL_FREE was not been set

btrfs_iget()
  // after some function calls
  -&gt;find_inode()
    // found the above inode 261
    -&gt;spin_lock(inode)
   // check I_FREEING|I_WILL_FREE
   // and passed
      -&gt;__iget()
    -&gt;spin_unlock(inode)                // schedule back
                                        -&gt;spin_lock(inode)
                                        // check (I_NEW|I_FREEING|I_WILL_FREE) flags,
                                        // passed and set I_FREEING
iput()                                  -&gt;spin_unlock(inode)
  -&gt;spin_lock(inode)			  -&gt;evict()
  // dec i_count to 0
  -&gt;iput_final()
    -&gt;spin_unlock()
    -&gt;evict()

Now, we have two threads simultaneously evicting
the same inode, which may trigger the BUG(inode-&gt;i_state &amp; I_CLEAR)
statement both within clear_inode() and iput().

To fix the bug, recheck the inode-&gt;i_count after holding i_lock.
Because in the most scenarios, the first check is valid, and
the overhead of spin_lock() can be reduced.

If there is any misunderstanding, please let me know, thanks.

[1]: https://lore.kernel.org/linux-btrfs/000000000000eabe1d0619c48986@google.com/
[2]: The reason might be 1. SB_ACTIVE was removed or 2. mapping_shrinkable()
return false when I reproduced the bug.</Note>
    </Notes>
    <CVE>CVE-2024-47679</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47679.html</URL>
        <Description>CVE-2024-47679</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231930</URL>
        <Description>SUSE Bug 1231930</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid OOB when system.data xattr changes underneath the filesystem

When looking up for an entry in an inlined directory, if e_value_offs is
changed underneath the filesystem by some change in the block device, it
will lead to an out-of-bounds access that KASAN detects as an UAF.

EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
loop0: detected capacity change from 2048 to 2047
==================================================================
BUG: KASAN: use-after-free in ext4_search_dir+0xf2/0x1c0 fs/ext4/namei.c:1500
Read of size 1 at addr ffff88803e91130f by task syz-executor269/5103

CPU: 0 UID: 0 PID: 5103 Comm: syz-executor269 Not tainted 6.11.0-rc4-syzkaller #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:93 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119
 print_address_description mm/kasan/report.c:377 [inline]
 print_report+0x169/0x550 mm/kasan/report.c:488
 kasan_report+0x143/0x180 mm/kasan/report.c:601
 ext4_search_dir+0xf2/0x1c0 fs/ext4/namei.c:1500
 ext4_find_inline_entry+0x4be/0x5e0 fs/ext4/inline.c:1697
 __ext4_find_entry+0x2b4/0x1b30 fs/ext4/namei.c:1573
 ext4_lookup_entry fs/ext4/namei.c:1727 [inline]
 ext4_lookup+0x15f/0x750 fs/ext4/namei.c:1795
 lookup_one_qstr_excl+0x11f/0x260 fs/namei.c:1633
 filename_create+0x297/0x540 fs/namei.c:3980
 do_symlinkat+0xf9/0x3a0 fs/namei.c:4587
 __do_sys_symlinkat fs/namei.c:4610 [inline]
 __se_sys_symlinkat fs/namei.c:4607 [inline]
 __x64_sys_symlinkat+0x95/0xb0 fs/namei.c:4607
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f3e73ced469
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 21 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fff4d40c258 EFLAGS: 00000246 ORIG_RAX: 000000000000010a
RAX: ffffffffffffffda RBX: 0032656c69662f2e RCX: 00007f3e73ced469
RDX: 0000000020000200 RSI: 00000000ffffff9c RDI: 00000000200001c0
RBP: 0000000000000000 R08: 00007fff4d40c290 R09: 00007fff4d40c290
R10: 0023706f6f6c2f76 R11: 0000000000000246 R12: 00007fff4d40c27c
R13: 0000000000000003 R14: 431bde82d7b634db R15: 00007fff4d40c2b0
 &lt;/TASK&gt;

Calling ext4_xattr_ibody_find right after reading the inode with
ext4_get_inode_loc will lead to a check of the validity of the xattrs,
avoiding this problem.</Note>
    </Notes>
    <CVE>CVE-2024-47701</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47701.html</URL>
        <Description>CVE-2024-47701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225742</URL>
        <Description>SUSE Bug 1225742</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231920</URL>
        <Description>SUSE Bug 1231920</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption

The TPM event log table is a Linux specific construct, where the data
produced by the GetEventLog() boot service is cached in memory, and
passed on to the OS using an EFI configuration table.

The use of EFI_LOADER_DATA here results in the region being left
unreserved in the E820 memory map constructed by the EFI stub, and this
is the memory description that is passed on to the incoming kernel by
kexec, which is therefore unaware that the region should be reserved.

Even though the utility of the TPM2 event log after a kexec is
questionable, any corruption might send the parsing code off into the
weeds and crash the kernel. So let's use EFI_ACPI_RECLAIM_MEMORY
instead, which is always treated as reserved by the E820 conversion
logic.</Note>
    </Notes>
    <CVE>CVE-2024-49858</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49858.html</URL>
        <Description>CVE-2024-49858</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232251</URL>
        <Description>SUSE Bug 1232251</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix a NULL pointer dereference when failed to start a new trasacntion

[BUG]
Syzbot reported a NULL pointer dereference with the following crash:

  FAULT_INJECTION: forcing a failure.
   start_transaction+0x830/0x1670 fs/btrfs/transaction.c:676
   prepare_to_relocate+0x31f/0x4c0 fs/btrfs/relocation.c:3642
   relocate_block_group+0x169/0xd20 fs/btrfs/relocation.c:3678
  ...
  BTRFS info (device loop0): balance: ended with status: -12
  Oops: general protection fault, probably for non-canonical address 0xdffffc00000000cc: 0000 [#1] PREEMPT SMP KASAN NOPTI
  KASAN: null-ptr-deref in range [0x0000000000000660-0x0000000000000667]
  RIP: 0010:btrfs_update_reloc_root+0x362/0xa80 fs/btrfs/relocation.c:926
  Call Trace:
   &lt;TASK&gt;
   commit_fs_roots+0x2ee/0x720 fs/btrfs/transaction.c:1496
   btrfs_commit_transaction+0xfaf/0x3740 fs/btrfs/transaction.c:2430
   del_balance_item fs/btrfs/volumes.c:3678 [inline]
   reset_balance_state+0x25e/0x3c0 fs/btrfs/volumes.c:3742
   btrfs_balance+0xead/0x10c0 fs/btrfs/volumes.c:4574
   btrfs_ioctl_balance+0x493/0x7c0 fs/btrfs/ioctl.c:3673
   vfs_ioctl fs/ioctl.c:51 [inline]
   __do_sys_ioctl fs/ioctl.c:907 [inline]
   __se_sys_ioctl+0xf9/0x170 fs/ioctl.c:893
   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
   do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

[CAUSE]
The allocation failure happens at the start_transaction() inside
prepare_to_relocate(), and during the error handling we call
unset_reloc_control(), which makes fs_info-&gt;balance_ctl to be NULL.

Then we continue the error path cleanup in btrfs_balance() by calling
reset_balance_state() which will call del_balance_item() to fully delete
the balance item in the root tree.

However during the small window between set_reloc_contrl() and
unset_reloc_control(), we can have a subvolume tree update and created a
reloc_root for that subvolume.

Then we go into the final btrfs_commit_transaction() of
del_balance_item(), and into btrfs_update_reloc_root() inside
commit_fs_roots().

That function checks if fs_info-&gt;reloc_ctl is in the merge_reloc_tree
stage, but since fs_info-&gt;reloc_ctl is NULL, it results a NULL pointer
dereference.

[FIX]
Just add extra check on fs_info-&gt;reloc_ctl inside
btrfs_update_reloc_root(), before checking
fs_info-&gt;reloc_ctl-&gt;merge_reloc_tree.

That DEAD_RELOC_TREE handling is to prevent further modification to the
reloc tree during merge stage, but since there is no reloc_ctl at all,
we do not need to bother that.</Note>
    </Notes>
    <CVE>CVE-2024-49868</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49868.html</URL>
        <Description>CVE-2024-49868</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232272</URL>
        <Description>SUSE Bug 1232272</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ext4: fix slab-use-after-free in ext4_split_extent_at()

We hit the following use-after-free:

==================================================================
BUG: KASAN: slab-use-after-free in ext4_split_extent_at+0xba8/0xcc0
Read of size 2 at addr ffff88810548ed08 by task kworker/u20:0/40
CPU: 0 PID: 40 Comm: kworker/u20:0 Not tainted 6.9.0-dirty #724
Call Trace:
 &lt;TASK&gt;
 kasan_report+0x93/0xc0
 ext4_split_extent_at+0xba8/0xcc0
 ext4_split_extent.isra.0+0x18f/0x500
 ext4_split_convert_extents+0x275/0x750
 ext4_ext_handle_unwritten_extents+0x73e/0x1580
 ext4_ext_map_blocks+0xe20/0x2dc0
 ext4_map_blocks+0x724/0x1700
 ext4_do_writepages+0x12d6/0x2a70
[...]

Allocated by task 40:
 __kmalloc_noprof+0x1ac/0x480
 ext4_find_extent+0xf3b/0x1e70
 ext4_ext_map_blocks+0x188/0x2dc0
 ext4_map_blocks+0x724/0x1700
 ext4_do_writepages+0x12d6/0x2a70
[...]

Freed by task 40:
 kfree+0xf1/0x2b0
 ext4_find_extent+0xa71/0x1e70
 ext4_ext_insert_extent+0xa22/0x3260
 ext4_split_extent_at+0x3ef/0xcc0
 ext4_split_extent.isra.0+0x18f/0x500
 ext4_split_convert_extents+0x275/0x750
 ext4_ext_handle_unwritten_extents+0x73e/0x1580
 ext4_ext_map_blocks+0xe20/0x2dc0
 ext4_map_blocks+0x724/0x1700
 ext4_do_writepages+0x12d6/0x2a70
[...]
==================================================================

The flow of issue triggering is as follows:

ext4_split_extent_at
  path = *ppath
  ext4_ext_insert_extent(ppath)
    ext4_ext_create_new_leaf(ppath)
      ext4_find_extent(orig_path)
        path = *orig_path
        read_extent_tree_block
          // return -ENOMEM or -EIO
        ext4_free_ext_path(path)
          kfree(path)
        *orig_path = NULL
  a. If err is -ENOMEM:
  ext4_ext_dirty(path + path-&gt;p_depth)
  // path use-after-free !!!
  b. If err is -EIO and we have EXT_DEBUG defined:
  ext4_ext_show_leaf(path)
    eh = path[depth].p_hdr
    // path also use-after-free !!!

So when trying to zeroout or fix the extent length, call ext4_find_extent()
to update the path.

In addition we use *ppath directly as an ext4_ext_show_leaf() input to
avoid possible use-after-free when EXT_DEBUG is defined, and to avoid
unnecessary path updates.</Note>
    </Notes>
    <CVE>CVE-2024-49884</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49884.html</URL>
        <Description>CVE-2024-49884</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225742</URL>
        <Description>SUSE Bug 1225742</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232198</URL>
        <Description>SUSE Bug 1232198</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check null pointers before used

[WHAT &amp; HOW]
Poniters, such as dc-&gt;clk_mgr, are null checked previously in the same
function, so Coverity warns "implies that "dc-&gt;clk_mgr" might be null".
As a result, these pointers need to be checked when used again.

This fixes 10 FORWARD_NULL issues reported by Coverity.</Note>
    </Notes>
    <CVE>CVE-2024-49921</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49921.html</URL>
        <Description>CVE-2024-49921</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232371</URL>
        <Description>SUSE Bug 1232371</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

fbdev: efifb: Register sysfs groups through driver core

The driver core can register and cleanup sysfs groups already.
Make use of that functionality to simplify the error handling and
cleanup.

Also avoid a UAF race during unregistering where the sysctl attributes
were usable after the info struct was freed.</Note>
    </Notes>
    <CVE>CVE-2024-49925</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49925.html</URL>
        <Description>CVE-2024-49925</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232224</URL>
        <Description>SUSE Bug 1232224</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232225</URL>
        <Description>SUSE Bug 1232225</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit

Syzbot points out that skb_trim() has a sanity check on the existing length of
the skb, which can be uninitialised in some error paths. The intent here is
clearly just to reset the length to zero before resubmitting, so switch to
calling __skb_set_length(skb, 0) directly. In addition, __skb_set_length()
already contains a call to skb_reset_tail_pointer(), so remove the redundant
call.

The syzbot report came from ath9k_hif_usb_reg_in_cb(), but there's a similar
usage of skb_trim() in ath9k_hif_usb_rx_cb(), change both while we're at it.</Note>
    </Notes>
    <CVE>CVE-2024-49938</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49938.html</URL>
        <Description>CVE-2024-49938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232552</URL>
        <Description>SUSE Bug 1232552</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/ncsi: Disable the ncsi work before freeing the associated structure

The work function can run after the ncsi device is freed, resulting
in use-after-free bugs or kernel panic.</Note>
    </Notes>
    <CVE>CVE-2024-49945</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49945.html</URL>
        <Description>CVE-2024-49945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232165</URL>
        <Description>SUSE Bug 1232165</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: Fix uaf in l2cap_connect

[Syzbot reported]
BUG: KASAN: slab-use-after-free in l2cap_connect.constprop.0+0x10d8/0x1270 net/bluetooth/l2cap_core.c:3949
Read of size 8 at addr ffff8880241e9800 by task kworker/u9:0/54

CPU: 0 UID: 0 PID: 54 Comm: kworker/u9:0 Not tainted 6.11.0-rc6-syzkaller-00268-g788220eee30d #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
Workqueue: hci2 hci_rx_work
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:93 [inline]
 dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:119
 print_address_description mm/kasan/report.c:377 [inline]
 print_report+0xc3/0x620 mm/kasan/report.c:488
 kasan_report+0xd9/0x110 mm/kasan/report.c:601
 l2cap_connect.constprop.0+0x10d8/0x1270 net/bluetooth/l2cap_core.c:3949
 l2cap_connect_req net/bluetooth/l2cap_core.c:4080 [inline]
 l2cap_bredr_sig_cmd net/bluetooth/l2cap_core.c:4772 [inline]
 l2cap_sig_channel net/bluetooth/l2cap_core.c:5543 [inline]
 l2cap_recv_frame+0xf0b/0x8eb0 net/bluetooth/l2cap_core.c:6825
 l2cap_recv_acldata+0x9b4/0xb70 net/bluetooth/l2cap_core.c:7514
 hci_acldata_packet net/bluetooth/hci_core.c:3791 [inline]
 hci_rx_work+0xaab/0x1610 net/bluetooth/hci_core.c:4028
 process_one_work+0x9c5/0x1b40 kernel/workqueue.c:3231
 process_scheduled_works kernel/workqueue.c:3312 [inline]
 worker_thread+0x6c8/0xed0 kernel/workqueue.c:3389
 kthread+0x2c1/0x3a0 kernel/kthread.c:389
 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
...

Freed by task 5245:
 kasan_save_stack+0x33/0x60 mm/kasan/common.c:47
 kasan_save_track+0x14/0x30 mm/kasan/common.c:68
 kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:579
 poison_slab_object+0xf7/0x160 mm/kasan/common.c:240
 __kasan_slab_free+0x32/0x50 mm/kasan/common.c:256
 kasan_slab_free include/linux/kasan.h:184 [inline]
 slab_free_hook mm/slub.c:2256 [inline]
 slab_free mm/slub.c:4477 [inline]
 kfree+0x12a/0x3b0 mm/slub.c:4598
 l2cap_conn_free net/bluetooth/l2cap_core.c:1810 [inline]
 kref_put include/linux/kref.h:65 [inline]
 l2cap_conn_put net/bluetooth/l2cap_core.c:1822 [inline]
 l2cap_conn_del+0x59d/0x730 net/bluetooth/l2cap_core.c:1802
 l2cap_connect_cfm+0x9e6/0xf80 net/bluetooth/l2cap_core.c:7241
 hci_connect_cfm include/net/bluetooth/hci_core.h:1960 [inline]
 hci_conn_failed+0x1c3/0x370 net/bluetooth/hci_conn.c:1265
 hci_abort_conn_sync+0x75a/0xb50 net/bluetooth/hci_sync.c:5583
 abort_conn_sync+0x197/0x360 net/bluetooth/hci_conn.c:2917
 hci_cmd_sync_work+0x1a4/0x410 net/bluetooth/hci_sync.c:328
 process_one_work+0x9c5/0x1b40 kernel/workqueue.c:3231
 process_scheduled_works kernel/workqueue.c:3312 [inline]
 worker_thread+0x6c8/0xed0 kernel/workqueue.c:3389
 kthread+0x2c1/0x3a0 kernel/kthread.c:389
 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244</Note>
    </Notes>
    <CVE>CVE-2024-49950</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49950.html</URL>
        <Description>CVE-2024-49950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225742</URL>
        <Description>SUSE Bug 1225742</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232159</URL>
        <Description>SUSE Bug 1232159</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: prevent nf_skb_duplicated corruption

syzbot found that nf_dup_ipv4() or nf_dup_ipv6() could write
per-cpu variable nf_skb_duplicated in an unsafe way [1].

Disabling preemption as hinted by the splat is not enough,
we have to disable soft interrupts as well.

[1]
BUG: using __this_cpu_write() in preemptible [00000000] code: syz.4.282/6316
 caller is nf_dup_ipv4+0x651/0x8f0 net/ipv4/netfilter/nf_dup_ipv4.c:87
CPU: 0 UID: 0 PID: 6316 Comm: syz.4.282 Not tainted 6.11.0-rc7-syzkaller-00104-g7052622fccb1 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
Call Trace:
 &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:93 [inline]
  dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119
  check_preemption_disabled+0x10e/0x120 lib/smp_processor_id.c:49
  nf_dup_ipv4+0x651/0x8f0 net/ipv4/netfilter/nf_dup_ipv4.c:87
  nft_dup_ipv4_eval+0x1db/0x300 net/ipv4/netfilter/nft_dup_ipv4.c:30
  expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]
  nft_do_chain+0x4ad/0x1da0 net/netfilter/nf_tables_core.c:288
  nft_do_chain_ipv4+0x202/0x320 net/netfilter/nft_chain_filter.c:23
  nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
  nf_hook_slow+0xc3/0x220 net/netfilter/core.c:626
  nf_hook+0x2c4/0x450 include/linux/netfilter.h:269
  NF_HOOK_COND include/linux/netfilter.h:302 [inline]
  ip_output+0x185/0x230 net/ipv4/ip_output.c:433
  ip_local_out net/ipv4/ip_output.c:129 [inline]
  ip_send_skb+0x74/0x100 net/ipv4/ip_output.c:1495
  udp_send_skb+0xacf/0x1650 net/ipv4/udp.c:981
  udp_sendmsg+0x1c21/0x2a60 net/ipv4/udp.c:1269
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x1a6/0x270 net/socket.c:745
  ____sys_sendmsg+0x525/0x7d0 net/socket.c:2597
  ___sys_sendmsg net/socket.c:2651 [inline]
  __sys_sendmmsg+0x3b2/0x740 net/socket.c:2737
  __do_sys_sendmmsg net/socket.c:2766 [inline]
  __se_sys_sendmmsg net/socket.c:2763 [inline]
  __x64_sys_sendmmsg+0xa0/0xb0 net/socket.c:2763
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f4ce4f7def9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f4ce5d4a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
RAX: ffffffffffffffda RBX: 00007f4ce5135f80 RCX: 00007f4ce4f7def9
RDX: 0000000000000001 RSI: 0000000020005d40 RDI: 0000000000000006
RBP: 00007f4ce4ff0b76 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f4ce5135f80 R15: 00007ffd4cbc6d68
 &lt;/TASK&gt;</Note>
    </Notes>
    <CVE>CVE-2024-49952</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49952.html</URL>
        <Description>CVE-2024-49952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232157</URL>
        <Description>SUSE Bug 1232157</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change

rfcomm_sk_state_change attempts to use sock_lock so it must never be
called with it locked but rfcomm_sock_ioctl always attempt to lock it
causing the following trace:

======================================================
WARNING: possible circular locking dependency detected
6.8.0-syzkaller-08951-gfe46a7dd189e #0 Not tainted
------------------------------------------------------
syz-executor386/5093 is trying to acquire lock:
ffff88807c396258 (sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1671 [inline]
ffff88807c396258 (sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM){+.+.}-{0:0}, at: rfcomm_sk_state_change+0x5b/0x310 net/bluetooth/rfcomm/sock.c:73

but task is already holding lock:
ffff88807badfd28 (&amp;d-&gt;lock){+.+.}-{3:3}, at: __rfcomm_dlc_close+0x226/0x6a0 net/bluetooth/rfcomm/core.c:491</Note>
    </Notes>
    <CVE>CVE-2024-50044</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50044.html</URL>
        <Description>CVE-2024-50044</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231904</URL>
        <Description>SUSE Bug 1231904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

driver core: bus: Fix double free in driver API bus_register()

For bus_register(), any error which happens after kset_register() will
cause that @priv are freed twice, fixed by setting @priv with NULL after
the first free.</Note>
    </Notes>
    <CVE>CVE-2024-50055</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50055.html</URL>
        <Description>CVE-2024-50055</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232329</URL>
        <Description>SUSE Bug 1232329</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tty: n_gsm: Fix use-after-free in gsm_cleanup_mux

BUG: KASAN: slab-use-after-free in gsm_cleanup_mux+0x77b/0x7b0
drivers/tty/n_gsm.c:3160 [n_gsm]
Read of size 8 at addr ffff88815fe99c00 by task poc/3379
CPU: 0 UID: 0 PID: 3379 Comm: poc Not tainted 6.11.0+ #56
Hardware name: VMware, Inc. VMware Virtual Platform/440BX
Desktop Reference Platform, BIOS 6.00 11/12/2020
Call Trace:
 &lt;TASK&gt;
 gsm_cleanup_mux+0x77b/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm]
 __pfx_gsm_cleanup_mux+0x10/0x10 drivers/tty/n_gsm.c:3124 [n_gsm]
 __pfx_sched_clock_cpu+0x10/0x10 kernel/sched/clock.c:389
 update_load_avg+0x1c1/0x27b0 kernel/sched/fair.c:4500
 __pfx_min_vruntime_cb_rotate+0x10/0x10 kernel/sched/fair.c:846
 __rb_insert_augmented+0x492/0xbf0 lib/rbtree.c:161
 gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm]
 _raw_spin_lock_irqsave+0x92/0xf0 arch/x86/include/asm/atomic.h:107
 __pfx_gsmld_ioctl+0x10/0x10 drivers/tty/n_gsm.c:3822 [n_gsm]
 ktime_get+0x5e/0x140 kernel/time/timekeeping.c:195
 ldsem_down_read+0x94/0x4e0 arch/x86/include/asm/atomic64_64.h:79
 __pfx_ldsem_down_read+0x10/0x10 drivers/tty/tty_ldsem.c:338
 __pfx_do_vfs_ioctl+0x10/0x10 fs/ioctl.c:805
 tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818

Allocated by task 65:
 gsm_data_alloc.constprop.0+0x27/0x190 drivers/tty/n_gsm.c:926 [n_gsm]
 gsm_send+0x2c/0x580 drivers/tty/n_gsm.c:819 [n_gsm]
 gsm1_receive+0x547/0xad0 drivers/tty/n_gsm.c:3038 [n_gsm]
 gsmld_receive_buf+0x176/0x280 drivers/tty/n_gsm.c:3609 [n_gsm]
 tty_ldisc_receive_buf+0x101/0x1e0 drivers/tty/tty_buffer.c:391
 tty_port_default_receive_buf+0x61/0xa0 drivers/tty/tty_port.c:39
 flush_to_ldisc+0x1b0/0x750 drivers/tty/tty_buffer.c:445
 process_scheduled_works+0x2b0/0x10d0 kernel/workqueue.c:3229
 worker_thread+0x3dc/0x950 kernel/workqueue.c:3391
 kthread+0x2a3/0x370 kernel/kthread.c:389
 ret_from_fork+0x2d/0x70 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:257

Freed by task 3367:
 kfree+0x126/0x420 mm/slub.c:4580
 gsm_cleanup_mux+0x36c/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm]
 gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm]
 tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818

[Analysis]
gsm_msg on the tx_ctrl_list or tx_data_list of gsm_mux
can be freed by multi threads through ioctl,which leads
to the occurrence of uaf. Protect it by gsm tx lock.</Note>
    </Notes>
    <CVE>CVE-2024-50073</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50073.html</URL>
        <Description>CVE-2024-50073</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225742</URL>
        <Description>SUSE Bug 1225742</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232520</URL>
        <Description>SUSE Bug 1232520</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

parport: Proper fix for array out-of-bounds access

The recent fix for array out-of-bounds accesses replaced sprintf()
calls blindly with snprintf().  However, since snprintf() returns the
would-be-printed size, not the actually output size, the length
calculation can still go over the given limit.

Use scnprintf() instead of snprintf(), which returns the actually
output letters, for addressing the potential out-of-bounds access
properly.</Note>
    </Notes>
    <CVE>CVE-2024-50074</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50074.html</URL>
        <Description>CVE-2024-50074</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232507</URL>
        <Description>SUSE Bug 1232507</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/mad: Improve handling of timed out WRs of mad agent

Current timeout handler of mad agent acquires/releases mad_agent_priv
lock for every timed out WRs. This causes heavy locking contention
when higher no. of WRs are to be handled inside timeout handler.

This leads to softlockup with below trace in some use cases where
rdma-cm path is used to establish connection between peer nodes

Trace:
-----
 BUG: soft lockup - CPU#4 stuck for 26s! [kworker/u128:3:19767]
 CPU: 4 PID: 19767 Comm: kworker/u128:3 Kdump: loaded Tainted: G OE
     -------  ---  5.14.0-427.13.1.el9_4.x86_64 #1
 Hardware name: Dell Inc. PowerEdge R740/01YM03, BIOS 2.4.8 11/26/2019
 Workqueue: ib_mad1 timeout_sends [ib_core]
 RIP: 0010:__do_softirq+0x78/0x2ac
 RSP: 0018:ffffb253449e4f98 EFLAGS: 00000246
 RAX: 00000000ffffffff RBX: 0000000000000000 RCX: 000000000000001f
 RDX: 000000000000001d RSI: 000000003d1879ab RDI: fff363b66fd3a86b
 RBP: ffffb253604cbcd8 R08: 0000009065635f3b R09: 0000000000000000
 R10: 0000000000000040 R11: ffffb253449e4ff8 R12: 0000000000000000
 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000040
 FS:  0000000000000000(0000) GS:ffff8caa1fc80000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 00007fd9ec9db900 CR3: 0000000891934006 CR4: 00000000007706e0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 PKRU: 55555554
 Call Trace:
  &lt;IRQ&gt;
  ? show_trace_log_lvl+0x1c4/0x2df
  ? show_trace_log_lvl+0x1c4/0x2df
  ? __irq_exit_rcu+0xa1/0xc0
  ? watchdog_timer_fn+0x1b2/0x210
  ? __pfx_watchdog_timer_fn+0x10/0x10
  ? __hrtimer_run_queues+0x127/0x2c0
  ? hrtimer_interrupt+0xfc/0x210
  ? __sysvec_apic_timer_interrupt+0x5c/0x110
  ? sysvec_apic_timer_interrupt+0x37/0x90
  ? asm_sysvec_apic_timer_interrupt+0x16/0x20
  ? __do_softirq+0x78/0x2ac
  ? __do_softirq+0x60/0x2ac
  __irq_exit_rcu+0xa1/0xc0
  sysvec_call_function_single+0x72/0x90
  &lt;/IRQ&gt;
  &lt;TASK&gt;
  asm_sysvec_call_function_single+0x16/0x20
 RIP: 0010:_raw_spin_unlock_irq+0x14/0x30
 RSP: 0018:ffffb253604cbd88 EFLAGS: 00000247
 RAX: 000000000001960d RBX: 0000000000000002 RCX: ffff8cad2a064800
 RDX: 000000008020001b RSI: 0000000000000001 RDI: ffff8cad5d39f66c
 RBP: ffff8cad5d39f600 R08: 0000000000000001 R09: 0000000000000000
 R10: ffff8caa443e0c00 R11: ffffb253604cbcd8 R12: ffff8cacb8682538
 R13: 0000000000000005 R14: ffffb253604cbd90 R15: ffff8cad5d39f66c
  cm_process_send_error+0x122/0x1d0 [ib_cm]
  timeout_sends+0x1dd/0x270 [ib_core]
  process_one_work+0x1e2/0x3b0
  ? __pfx_worker_thread+0x10/0x10
  worker_thread+0x50/0x3a0
  ? __pfx_worker_thread+0x10/0x10
  kthread+0xdd/0x100
  ? __pfx_kthread+0x10/0x10
  ret_from_fork+0x29/0x50
  &lt;/TASK&gt;

Simplified timeout handler by creating local list of timed out WRs
and invoke send handler post creating the list. The new method acquires/
releases lock once to fetch the list and hence helps to reduce locking
contetiong when processing higher no. of WRs</Note>
    </Notes>
    <CVE>CVE-2024-50095</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50095.html</URL>
        <Description>CVE-2024-50095</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232873</URL>
        <Description>SUSE Bug 1232873</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

arm64: probes: Remove broken LDR (literal) uprobe support

The simulate_ldr_literal() and simulate_ldrsw_literal() functions are
unsafe to use for uprobes. Both functions were originally written for
use with kprobes, and access memory with plain C accesses. When uprobes
was added, these were reused unmodified even though they cannot safely
access user memory.

There are three key problems:

1) The plain C accesses do not have corresponding extable entries, and
   thus if they encounter a fault the kernel will treat these as
   unintentional accesses to user memory, resulting in a BUG() which
   will kill the kernel thread, and likely lead to further issues (e.g.
   lockup or panic()).

2) The plain C accesses are subject to HW PAN and SW PAN, and so when
   either is in use, any attempt to simulate an access to user memory
   will fault. Thus neither simulate_ldr_literal() nor
   simulate_ldrsw_literal() can do anything useful when simulating a
   user instruction on any system with HW PAN or SW PAN.

3) The plain C accesses are privileged, as they run in kernel context,
   and in practice can access a small range of kernel virtual addresses.
   The instructions they simulate have a range of +/-1MiB, and since the
   simulated instructions must itself be a user instructions in the
   TTBR0 address range, these can address the final 1MiB of the TTBR1
   acddress range by wrapping downwards from an address in the first
   1MiB of the TTBR0 address range.

   In contemporary kernels the last 8MiB of TTBR1 address range is
   reserved, and accesses to this will always fault, meaning this is no
   worse than (1).

   Historically, it was theoretically possible for the linear map or
   vmemmap to spill into the final 8MiB of the TTBR1 address range, but
   in practice this is extremely unlikely to occur as this would
   require either:

   * Having enough physical memory to fill the entire linear map all the
     way to the final 1MiB of the TTBR1 address range.

   * Getting unlucky with KASLR randomization of the linear map such
     that the populated region happens to overlap with the last 1MiB of
     the TTBR address range.

   ... and in either case if we were to spill into the final page there
   would be larger problems as the final page would alias with error
   pointers.

Practically speaking, (1) and (2) are the big issues. Given there have
been no reports of problems since the broken code was introduced, it
appears that no-one is relying on probing these instructions with
uprobes.

Avoid these issues by not allowing uprobes on LDR (literal) and LDRSW
(literal), limiting the use of simulate_ldr_literal() and
simulate_ldrsw_literal() to kprobes. Attempts to place uprobes on LDR
(literal) and LDRSW (literal) will be rejected as
arm_probe_decode_insn() will return INSN_REJECTED. In future we can
consider introducing working uprobes support for these instructions, but
this will require more significant work.</Note>
    </Notes>
    <CVE>CVE-2024-50099</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50099.html</URL>
        <Description>CVE-2024-50099</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232887</URL>
        <Description>SUSE Bug 1232887</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory

Ignore nCR3[4:0] when loading PDPTEs from memory for nested SVM, as bits
4:0 of CR3 are ignored when PAE paging is used, and thus VMRUN doesn't
enforce 32-byte alignment of nCR3.

In the absolute worst case scenario, failure to ignore bits 4:0 can result
in an out-of-bounds read, e.g. if the target page is at the end of a
memslot, and the VMM isn't using guard pages.

Per the APM:

  The CR3 register points to the base address of the page-directory-pointer
  table. The page-directory-pointer table is aligned on a 32-byte boundary,
  with the low 5 address bits 4:0 assumed to be 0.

And the SDM's much more explicit:

  4:0    Ignored

Note, KVM gets this right when loading PDPTRs, it's only the nSVM flow
that is broken.</Note>
    </Notes>
    <CVE>CVE-2024-50115</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50115.html</URL>
        <Description>CVE-2024-50115</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225742</URL>
        <Description>SUSE Bug 1225742</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232919</URL>
        <Description>SUSE Bug 1232919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233019</URL>
        <Description>SUSE Bug 1233019</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd: Guard against bad data for ATIF ACPI method

If a BIOS provides bad data in response to an ATIF method call
this causes a NULL pointer dereference in the caller.

```
? show_regs (arch/x86/kernel/dumpstack.c:478 (discriminator 1))
? __die (arch/x86/kernel/dumpstack.c:423 arch/x86/kernel/dumpstack.c:434)
? page_fault_oops (arch/x86/mm/fault.c:544 (discriminator 2) arch/x86/mm/fault.c:705 (discriminator 2))
? do_user_addr_fault (arch/x86/mm/fault.c:440 (discriminator 1) arch/x86/mm/fault.c:1232 (discriminator 1))
? acpi_ut_update_object_reference (drivers/acpi/acpica/utdelete.c:642)
? exc_page_fault (arch/x86/mm/fault.c:1542)
? asm_exc_page_fault (./arch/x86/include/asm/idtentry.h:623)
? amdgpu_atif_query_backlight_caps.constprop.0 (drivers/gpu/drm/amd/amdgpu/amdgpu_acpi.c:387 (discriminator 2)) amdgpu
? amdgpu_atif_query_backlight_caps.constprop.0 (drivers/gpu/drm/amd/amdgpu/amdgpu_acpi.c:386 (discriminator 1)) amdgpu
```

It has been encountered on at least one system, so guard for it.

(cherry picked from commit c9b7c809b89f24e9372a4e7f02d64c950b07fdee)</Note>
    </Notes>
    <CVE>CVE-2024-50117</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50117.html</URL>
        <Description>CVE-2024-50117</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232897</URL>
        <Description>SUSE Bug 1232897</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: SCO: Fix UAF on sco_sock_timeout

conn-&gt;sk maybe have been unlinked/freed while waiting for sco_conn_lock
so this checks if the conn-&gt;sk is still valid by checking if it part of
sco_sk_list.</Note>
    </Notes>
    <CVE>CVE-2024-50125</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50125.html</URL>
        <Description>CVE-2024-50125</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232928</URL>
        <Description>SUSE Bug 1232928</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232929</URL>
        <Description>SUSE Bug 1232929</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nvme-pci: fix race condition between reset and nvme_dev_disable()

nvme_dev_disable() modifies the dev-&gt;online_queues field, therefore
nvme_pci_update_nr_queues() should avoid racing against it, otherwise
we could end up passing invalid values to blk_mq_update_nr_hw_queues().

 WARNING: CPU: 39 PID: 61303 at drivers/pci/msi/api.c:347
          pci_irq_get_affinity+0x187/0x210
 Workqueue: nvme-reset-wq nvme_reset_work [nvme]
 RIP: 0010:pci_irq_get_affinity+0x187/0x210
 Call Trace:
  &lt;TASK&gt;
  ? blk_mq_pci_map_queues+0x87/0x3c0
  ? pci_irq_get_affinity+0x187/0x210
  blk_mq_pci_map_queues+0x87/0x3c0
  nvme_pci_map_queues+0x189/0x460 [nvme]
  blk_mq_update_nr_hw_queues+0x2a/0x40
  nvme_reset_work+0x1be/0x2a0 [nvme]

Fix the bug by locking the shutdown_lock mutex before using
dev-&gt;online_queues. Give up if nvme_dev_disable() is running or if
it has been executed already.</Note>
    </Notes>
    <CVE>CVE-2024-50135</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50135.html</URL>
        <Description>CVE-2024-50135</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232888</URL>
        <Description>SUSE Bug 1232888</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: bnep: fix wild-memory-access in proto_unregister

There's issue as follows:
  KASAN: maybe wild-memory-access in range [0xdead...108-0xdead...10f]
  CPU: 3 UID: 0 PID: 2805 Comm: rmmod Tainted: G        W
  RIP: 0010:proto_unregister+0xee/0x400
  Call Trace:
   &lt;TASK&gt;
   __do_sys_delete_module+0x318/0x580
   do_syscall_64+0xc1/0x1d0
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

As bnep_init() ignore bnep_sock_init()'s return value, and bnep_sock_init()
will cleanup all resource. Then when remove bnep module will call
bnep_sock_cleanup() to cleanup sock's resource.
To solve above issue just return bnep_sock_init()'s return value in
bnep_exit().</Note>
    </Notes>
    <CVE>CVE-2024-50148</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50148.html</URL>
        <Description>CVE-2024-50148</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233063</URL>
        <Description>SUSE Bug 1233063</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

usb: typec: altmode should keep reference to parent

The altmode device release refers to its parent device, but without keeping
a reference to it.

When registering the altmode, get a reference to the parent and put it in
the release function.

Before this fix, when using CONFIG_DEBUG_KOBJECT_RELEASE, we see issues
like this:

[   43.572860] kobject: 'port0.0' (ffff8880057ba008): kobject_release, parent 0000000000000000 (delayed 3000)
[   43.573532] kobject: 'port0.1' (ffff8880057bd008): kobject_release, parent 0000000000000000 (delayed 1000)
[   43.574407] kobject: 'port0' (ffff8880057b9008): kobject_release, parent 0000000000000000 (delayed 3000)
[   43.575059] kobject: 'port1.0' (ffff8880057ca008): kobject_release, parent 0000000000000000 (delayed 4000)
[   43.575908] kobject: 'port1.1' (ffff8880057c9008): kobject_release, parent 0000000000000000 (delayed 4000)
[   43.576908] kobject: 'typec' (ffff8880062dbc00): kobject_release, parent 0000000000000000 (delayed 4000)
[   43.577769] kobject: 'port1' (ffff8880057bf008): kobject_release, parent 0000000000000000 (delayed 3000)
[   46.612867] ==================================================================
[   46.613402] BUG: KASAN: slab-use-after-free in typec_altmode_release+0x38/0x129
[   46.614003] Read of size 8 at addr ffff8880057b9118 by task kworker/2:1/48
[   46.614538]
[   46.614668] CPU: 2 UID: 0 PID: 48 Comm: kworker/2:1 Not tainted 6.12.0-rc1-00138-gedbae730ad31 #535
[   46.615391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014
[   46.616042] Workqueue: events kobject_delayed_cleanup
[   46.616446] Call Trace:
[   46.616648]  &lt;TASK&gt;
[   46.616820]  dump_stack_lvl+0x5b/0x7c
[   46.617112]  ? typec_altmode_release+0x38/0x129
[   46.617470]  print_report+0x14c/0x49e
[   46.617769]  ? rcu_read_unlock_sched+0x56/0x69
[   46.618117]  ? __virt_addr_valid+0x19a/0x1ab
[   46.618456]  ? kmem_cache_debug_flags+0xc/0x1d
[   46.618807]  ? typec_altmode_release+0x38/0x129
[   46.619161]  kasan_report+0x8d/0xb4
[   46.619447]  ? typec_altmode_release+0x38/0x129
[   46.619809]  ? process_scheduled_works+0x3cb/0x85f
[   46.620185]  typec_altmode_release+0x38/0x129
[   46.620537]  ? process_scheduled_works+0x3cb/0x85f
[   46.620907]  device_release+0xaf/0xf2
[   46.621206]  kobject_delayed_cleanup+0x13b/0x17a
[   46.621584]  process_scheduled_works+0x4f6/0x85f
[   46.621955]  ? __pfx_process_scheduled_works+0x10/0x10
[   46.622353]  ? hlock_class+0x31/0x9a
[   46.622647]  ? lock_acquired+0x361/0x3c3
[   46.622956]  ? move_linked_works+0x46/0x7d
[   46.623277]  worker_thread+0x1ce/0x291
[   46.623582]  ? __kthread_parkme+0xc8/0xdf
[   46.623900]  ? __pfx_worker_thread+0x10/0x10
[   46.624236]  kthread+0x17e/0x190
[   46.624501]  ? kthread+0xfb/0x190
[   46.624756]  ? __pfx_kthread+0x10/0x10
[   46.625015]  ret_from_fork+0x20/0x40
[   46.625268]  ? __pfx_kthread+0x10/0x10
[   46.625532]  ret_from_fork_asm+0x1a/0x30
[   46.625805]  &lt;/TASK&gt;
[   46.625953]
[   46.626056] Allocated by task 678:
[   46.626287]  kasan_save_stack+0x24/0x44
[   46.626555]  kasan_save_track+0x14/0x2d
[   46.626811]  __kasan_kmalloc+0x3f/0x4d
[   46.627049]  __kmalloc_noprof+0x1bf/0x1f0
[   46.627362]  typec_register_port+0x23/0x491
[   46.627698]  cros_typec_probe+0x634/0xbb6
[   46.628026]  platform_probe+0x47/0x8c
[   46.628311]  really_probe+0x20a/0x47d
[   46.628605]  device_driver_attach+0x39/0x72
[   46.628940]  bind_store+0x87/0xd7
[   46.629213]  kernfs_fop_write_iter+0x1aa/0x218
[   46.629574]  vfs_write+0x1d6/0x29b
[   46.629856]  ksys_write+0xcd/0x13b
[   46.630128]  do_syscall_64+0xd4/0x139
[   46.630420]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[   46.630820]
[   46.630946] Freed by task 48:
[   46.631182]  kasan_save_stack+0x24/0x44
[   46.631493]  kasan_save_track+0x14/0x2d
[   46.631799]  kasan_save_free_info+0x3f/0x4d
[   46.632144]  __kasan_slab_free+0x37/0x45
[   46.632474]
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-50150</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50150.html</URL>
        <Description>CVE-2024-50150</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233051</URL>
        <Description>SUSE Bug 1233051</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink().

Martin KaFai Lau reported use-after-free [0] in reqsk_timer_handler().

  """
  We are seeing a use-after-free from a bpf prog attached to
  trace_tcp_retransmit_synack. The program passes the req-&gt;sk to the
  bpf_sk_storage_get_tracing kernel helper which does check for null
  before using it.
  """

The commit 83fccfc3940c ("inet: fix potential deadlock in
reqsk_queue_unlink()") added timer_pending() in reqsk_queue_unlink() not
to call del_timer_sync() from reqsk_timer_handler(), but it introduced a
small race window.

Before the timer is called, expire_timers() calls detach_timer(timer, true)
to clear timer-&gt;entry.pprev and marks it as not pending.

If reqsk_queue_unlink() checks timer_pending() just after expire_timers()
calls detach_timer(), TCP will miss del_timer_sync(); the reqsk timer will
continue running and send multiple SYN+ACKs until it expires.

The reported UAF could happen if req-&gt;sk is close()d earlier than the timer
expiration, which is 63s by default.

The scenario would be

  1. inet_csk_complete_hashdance() calls inet_csk_reqsk_queue_drop(),
     but del_timer_sync() is missed

  2. reqsk timer is executed and scheduled again

  3. req-&gt;sk is accept()ed and reqsk_put() decrements rsk_refcnt, but
     reqsk timer still has another one, and inet_csk_accept() does not
     clear req-&gt;sk for non-TFO sockets

  4. sk is close()d

  5. reqsk timer is executed again, and BPF touches req-&gt;sk

Let's not use timer_pending() by passing the caller context to
__inet_csk_reqsk_queue_drop().

Note that reqsk timer is pinned, so the issue does not happen in most
use cases. [1]

[0]
BUG: KFENCE: use-after-free read in bpf_sk_storage_get_tracing+0x2e/0x1b0

Use-after-free read at 0x00000000a891fb3a (in kfence-#1):
bpf_sk_storage_get_tracing+0x2e/0x1b0
bpf_prog_5ea3e95db6da0438_tcp_retransmit_synack+0x1d20/0x1dda
bpf_trace_run2+0x4c/0xc0
tcp_rtx_synack+0xf9/0x100
reqsk_timer_handler+0xda/0x3d0
run_timer_softirq+0x292/0x8a0
irq_exit_rcu+0xf5/0x320
sysvec_apic_timer_interrupt+0x6d/0x80
asm_sysvec_apic_timer_interrupt+0x16/0x20
intel_idle_irq+0x5a/0xa0
cpuidle_enter_state+0x94/0x273
cpu_startup_entry+0x15e/0x260
start_secondary+0x8a/0x90
secondary_startup_64_no_verify+0xfa/0xfb

kfence-#1: 0x00000000a72cc7b6-0x00000000d97616d9, size=2376, cache=TCPv6

allocated by task 0 on cpu 9 at 260507.901592s:
sk_prot_alloc+0x35/0x140
sk_clone_lock+0x1f/0x3f0
inet_csk_clone_lock+0x15/0x160
tcp_create_openreq_child+0x1f/0x410
tcp_v6_syn_recv_sock+0x1da/0x700
tcp_check_req+0x1fb/0x510
tcp_v6_rcv+0x98b/0x1420
ipv6_list_rcv+0x2258/0x26e0
napi_complete_done+0x5b1/0x2990
mlx5e_napi_poll+0x2ae/0x8d0
net_rx_action+0x13e/0x590
irq_exit_rcu+0xf5/0x320
common_interrupt+0x80/0x90
asm_common_interrupt+0x22/0x40
cpuidle_enter_state+0xfb/0x273
cpu_startup_entry+0x15e/0x260
start_secondary+0x8a/0x90
secondary_startup_64_no_verify+0xfa/0xfb

freed by task 0 on cpu 9 at 260507.927527s:
rcu_core_si+0x4ff/0xf10
irq_exit_rcu+0xf5/0x320
sysvec_apic_timer_interrupt+0x6d/0x80
asm_sysvec_apic_timer_interrupt+0x16/0x20
cpuidle_enter_state+0xfb/0x273
cpu_startup_entry+0x15e/0x260
start_secondary+0x8a/0x90
secondary_startup_64_no_verify+0xfa/0xfb</Note>
    </Notes>
    <CVE>CVE-2024-50154</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50154.html</URL>
        <Description>CVE-2024-50154</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233070</URL>
        <Description>SUSE Bug 1233070</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233072</URL>
        <Description>SUSE Bug 1233072</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

be2net: fix potential memory leak in be_xmit()

The be_xmit() returns NETDEV_TX_OK without freeing skb
in case of be_xmit_enqueue() fails, add dev_kfree_skb_any() to fix it.</Note>
    </Notes>
    <CVE>CVE-2024-50167</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50167.html</URL>
        <Description>CVE-2024-50167</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233049</URL>
        <Description>SUSE Bug 1233049</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: systemport: fix potential memory leak in bcm_sysport_xmit()

The bcm_sysport_xmit() returns NETDEV_TX_OK without freeing skb
in case of dma_map_single() fails, add dev_kfree_skb() to fix it.</Note>
    </Notes>
    <CVE>CVE-2024-50171</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50171.html</URL>
        <Description>CVE-2024-50171</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233057</URL>
        <Description>SUSE Bug 1233057</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ceph: remove the incorrect Fw reference check when dirtying pages

When doing the direct-io reads it will also try to mark pages dirty,
but for the read path it won't hold the Fw caps and there is case
will it get the Fw reference.</Note>
    </Notes>
    <CVE>CVE-2024-50179</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50179.html</URL>
        <Description>CVE-2024-50179</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233123</URL>
        <Description>SUSE Bug 1233123</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV instance

Deleting an NPIV instance requires all fabric ndlps to be released before
an NPIV's resources can be torn down.  Failure to release fabric ndlps
beforehand opens kref imbalance race conditions.  Fix by forcing the DA_ID
to complete synchronously with usage of wait_queue.</Note>
    </Notes>
    <CVE>CVE-2024-50183</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50183.html</URL>
        <Description>CVE-2024-50183</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233130</URL>
        <Description>SUSE Bug 1233130</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/vc4: Stop the active perfmon before being destroyed

Upon closing the file descriptor, the active performance monitor is not
stopped. Although all perfmons are destroyed in `vc4_perfmon_close_file()`,
the active performance monitor's pointer (`vc4-&gt;active_perfmon`) is still
retained.

If we open a new file descriptor and submit a few jobs with performance
monitors, the driver will attempt to stop the active performance monitor
using the stale pointer in `vc4-&gt;active_perfmon`. However, this pointer
is no longer valid because the previous process has already terminated,
and all performance monitors associated with it have been destroyed and
freed.

To fix this, when the active performance monitor belongs to a given
process, explicitly stop it before destroying and freeing it.</Note>
    </Notes>
    <CVE>CVE-2024-50187</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50187.html</URL>
        <Description>CVE-2024-50187</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233108</URL>
        <Description>SUSE Bug 1233108</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

arm64: probes: Fix uprobes for big-endian kernels

The arm64 uprobes code is broken for big-endian kernels as it doesn't
convert the in-memory instruction encoding (which is always
little-endian) into the kernel's native endianness before analyzing and
simulating instructions. This may result in a few distinct problems:

* The kernel may may erroneously reject probing an instruction which can
  safely be probed.

* The kernel may erroneously erroneously permit stepping an
  instruction out-of-line when that instruction cannot be stepped
  out-of-line safely.

* The kernel may erroneously simulate instruction incorrectly dur to
  interpretting the byte-swapped encoding.

The endianness mismatch isn't caught by the compiler or sparse because:

* The arch_uprobe::{insn,ixol} fields are encoded as arrays of u8, so
  the compiler and sparse have no idea these contain a little-endian
  32-bit value. The core uprobes code populates these with a memcpy()
  which similarly does not handle endianness.

* While the uprobe_opcode_t type is an alias for __le32, both
  arch_uprobe_analyze_insn() and arch_uprobe_skip_sstep() cast from u8[]
  to the similarly-named probe_opcode_t, which is an alias for u32.
  Hence there is no endianness conversion warning.

Fix this by changing the arch_uprobe::{insn,ixol} fields to __le32 and
adding the appropriate __le32_to_cpu() conversions prior to consuming
the instruction encoding. The core uprobes copies these fields as opaque
ranges of bytes, and so is unaffected by this change.

At the same time, remove MAX_UINSN_BYTES and consistently use
AARCH64_INSN_SIZE for clarity.

Tested with the following:

| #include &lt;stdio.h&gt;
| #include &lt;stdbool.h&gt;
|
| #define noinline __attribute__((noinline))
|
| static noinline void *adrp_self(void)
| {
|         void *addr;
|
|         asm volatile(
|         "       adrp    %x0, adrp_self\n"
|         "       add     %x0, %x0, :lo12:adrp_self\n"
|         : "=r" (addr));
| }
|
|
| int main(int argc, char *argv)
| {
|         void *ptr = adrp_self();
|         bool equal = (ptr == adrp_self);
|
|         printf("adrp_self   =&gt; %p\n"
|                "adrp_self() =&gt; %p\n"
|                "%s\n",
|                adrp_self, ptr, equal ? "EQUAL" : "NOT EQUAL");
|
|         return 0;
| }

.... where the adrp_self() function was compiled to:

| 00000000004007e0 &lt;adrp_self&gt;:
|   4007e0:       90000000        adrp    x0, 400000 &lt;__ehdr_start&gt;
|   4007e4:       911f8000        add     x0, x0, #0x7e0
|   4007e8:       d65f03c0        ret

Before this patch, the ADRP is not recognized, and is assumed to be
steppable, resulting in corruption of the result:

| # ./adrp-self
| adrp_self   =&gt; 0x4007e0
| adrp_self() =&gt; 0x4007e0
| EQUAL
| # echo 'p /root/adrp-self:0x007e0' &gt; /sys/kernel/tracing/uprobe_events
| # echo 1 &gt; /sys/kernel/tracing/events/uprobes/enable
| # ./adrp-self
| adrp_self   =&gt; 0x4007e0
| adrp_self() =&gt; 0xffffffffff7e0
| NOT EQUAL

After this patch, the ADRP is correctly recognized and simulated:

| # ./adrp-self
| adrp_self   =&gt; 0x4007e0
| adrp_self() =&gt; 0x4007e0
| EQUAL
| #
| # echo 'p /root/adrp-self:0x007e0' &gt; /sys/kernel/tracing/uprobe_events
| # echo 1 &gt; /sys/kernel/tracing/events/uprobes/enable
| # ./adrp-self
| adrp_self   =&gt; 0x4007e0
| adrp_self() =&gt; 0x4007e0
| EQUAL</Note>
    </Notes>
    <CVE>CVE-2024-50194</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50194.html</URL>
        <Description>CVE-2024-50194</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233111</URL>
        <Description>SUSE Bug 1233111</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="50">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

posix-clock: Fix missing timespec64 check in pc_clock_settime()

As Andrew pointed out, it will make sense that the PTP core
checked timespec64 struct's tv_sec and tv_nsec range before calling
ptp-&gt;info-&gt;settime64().

As the man manual of clock_settime() said, if tp.tv_sec is negative or
tp.tv_nsec is outside the range [0..999,999,999], it should return EINVAL,
which include dynamic clocks which handles PTP clock, and the condition is
consistent with timespec64_valid(). As Thomas suggested, timespec64_valid()
only check the timespec is valid, but not ensure that the time is
in a valid range, so check it ahead using timespec64_valid_strict()
in pc_clock_settime() and return -EINVAL if not valid.

There are some drivers that use tp-&gt;tv_sec and tp-&gt;tv_nsec directly to
write registers without validity checks and assume that the higher layer
has checked it, which is dangerous and will benefit from this, such as
hclge_ptp_settime(), igb_ptp_settime_i210(), _rcar_gen4_ptp_settime(),
and some drivers can remove the checks of itself.</Note>
    </Notes>
    <CVE>CVE-2024-50195</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50195.html</URL>
        <Description>CVE-2024-50195</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233103</URL>
        <Description>SUSE Bug 1233103</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="51">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

posix-clock: posix-clock: Fix unbalanced locking in pc_clock_settime()

If get_clock_desc() succeeds, it calls fget() for the clockid's fd,
and get the clk-&gt;rwsem read lock, so the error path should release
the lock to make the lock balance and fput the clockid's fd to make
the refcount balance and release the fd related resource.

However the below commit left the error path locked behind resulting in
unbalanced locking. Check timespec64_valid_strict() before
get_clock_desc() to fix it, because the "ts" is not changed
after that.

[pabeni@redhat.com: fixed commit message typo]</Note>
    </Notes>
    <CVE>CVE-2024-50210</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50210.html</URL>
        <Description>CVE-2024-50210</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233097</URL>
        <Description>SUSE Bug 1233097</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="52">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow

Syzbot reported a kernel BUG in ocfs2_truncate_inline.  There are two
reasons for this: first, the parameter value passed is greater than
ocfs2_max_inline_data_with_xattr, second, the start and end parameters of
ocfs2_truncate_inline are "unsigned int".

So, we need to add a sanity check for byte_start and byte_len right before
ocfs2_truncate_inline() in ocfs2_remove_inode_range(), if they are greater
than ocfs2_max_inline_data_with_xattr return -EINVAL.</Note>
    </Notes>
    <CVE>CVE-2024-50218</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50218.html</URL>
        <Description>CVE-2024-50218</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233191</URL>
        <Description>SUSE Bug 1233191</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="53">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlegacy: Clear stale interrupts before resuming device

iwl4965 fails upon resume from hibernation on my laptop. The reason
seems to be a stale interrupt which isn't being cleared out before
interrupts are enabled. We end up with a race beween the resume
trying to bring things back up, and the restart work (queued form
the interrupt handler) trying to bring things down. Eventually
the whole thing blows up.

Fix the problem by clearing out any stale interrupts before
interrupts get enabled during resume.

Here's a debug log of the indicent:
[   12.042589] ieee80211 phy0: il_isr ISR inta 0x00000080, enabled 0xaa00008b, fh 0x00000000
[   12.042625] ieee80211 phy0: il4965_irq_tasklet inta 0x00000080, enabled 0x00000000, fh 0x00000000
[   12.042651] iwl4965 0000:10:00.0: RF_KILL bit toggled to enable radio.
[   12.042653] iwl4965 0000:10:00.0: On demand firmware reload
[   12.042690] ieee80211 phy0: il4965_irq_tasklet End inta 0x00000000, enabled 0xaa00008b, fh 0x00000000, flags 0x00000282
[   12.052207] ieee80211 phy0: il4965_mac_start enter
[   12.052212] ieee80211 phy0: il_prep_station Add STA to driver ID 31: ff:ff:ff:ff:ff:ff
[   12.052244] ieee80211 phy0: il4965_set_hw_ready hardware  ready
[   12.052324] ieee80211 phy0: il_apm_init Init card's basic functions
[   12.052348] ieee80211 phy0: il_apm_init L1 Enabled; Disabling L0S
[   12.055727] ieee80211 phy0: il4965_load_bsm Begin load bsm
[   12.056140] ieee80211 phy0: il4965_verify_bsm Begin verify bsm
[   12.058642] ieee80211 phy0: il4965_verify_bsm BSM bootstrap uCode image OK
[   12.058721] ieee80211 phy0: il4965_load_bsm BSM write complete, poll 1 iterations
[   12.058734] ieee80211 phy0: __il4965_up iwl4965 is coming up
[   12.058737] ieee80211 phy0: il4965_mac_start Start UP work done.
[   12.058757] ieee80211 phy0: __il4965_down iwl4965 is going down
[   12.058761] ieee80211 phy0: il_scan_cancel_timeout Scan cancel timeout
[   12.058762] ieee80211 phy0: il_do_scan_abort Not performing scan to abort
[   12.058765] ieee80211 phy0: il_clear_ucode_stations Clearing ucode stations in driver
[   12.058767] ieee80211 phy0: il_clear_ucode_stations No active stations found to be cleared
[   12.058819] ieee80211 phy0: _il_apm_stop Stop card, put in low power state
[   12.058827] ieee80211 phy0: _il_apm_stop_master stop master
[   12.058864] ieee80211 phy0: il4965_clear_free_frames 0 frames on pre-allocated heap on clear.
[   12.058869] ieee80211 phy0: Hardware restart was requested
[   16.132299] iwl4965 0000:10:00.0: START_ALIVE timeout after 4000ms.
[   16.132303] ------------[ cut here ]------------
[   16.132304] Hardware became unavailable upon resume. This could be a software issue prior to suspend or a hardware issue.
[   16.132338] WARNING: CPU: 0 PID: 181 at net/mac80211/util.c:1826 ieee80211_reconfig+0x8f/0x14b0 [mac80211]
[   16.132390] Modules linked in: ctr ccm sch_fq_codel xt_tcpudp xt_multiport xt_state iptable_filter iptable_nat nf_nat nf_conntrack nf_defrag_ipv4 ip_tables x_tables binfmt_misc joydev mousedev btusb btrtl btintel btbcm bluetooth ecdh_generic ecc iTCO_wdt i2c_dev iwl4965 iwlegacy coretemp snd_hda_codec_analog pcspkr psmouse mac80211 snd_hda_codec_generic libarc4 sdhci_pci cqhci sha256_generic sdhci libsha256 firewire_ohci snd_hda_intel snd_intel_dspcfg mmc_core snd_hda_codec snd_hwdep firewire_core led_class iosf_mbi snd_hda_core uhci_hcd lpc_ich crc_itu_t cfg80211 ehci_pci ehci_hcd snd_pcm usbcore mfd_core rfkill snd_timer snd usb_common soundcore video parport_pc parport intel_agp wmi intel_gtt backlight e1000e agpgart evdev
[   16.132456] CPU: 0 UID: 0 PID: 181 Comm: kworker/u8:6 Not tainted 6.11.0-cl+ #143
[   16.132460] Hardware name: Hewlett-Packard HP Compaq 6910p/30BE, BIOS 68MCU Ver. F.19 07/06/2010
[   16.132463] Workqueue: async async_run_entry_fn
[   16.132469] RIP: 0010:ieee80211_reconfig+0x8f/0x14b0 [mac80211]
[   16.132501] Code: da 02 00 0
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-50234</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50234.html</URL>
        <Description>CVE-2024-50234</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233211</URL>
        <Description>SUSE Bug 1233211</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="54">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: ath10k: Fix memory leak in management tx

In the current logic, memory is allocated for storing the MSDU context
during management packet TX but this memory is not being freed during
management TX completion. Similar leaks are seen in the management TX
cleanup logic.

Kmemleak reports this problem as below,

unreferenced object 0xffffff80b64ed250 (size 16):
  comm "kworker/u16:7", pid 148, jiffies 4294687130 (age 714.199s)
  hex dump (first 16 bytes):
    00 2b d8 d8 80 ff ff ff c4 74 e9 fd 07 00 00 00  .+.......t......
  backtrace:
    [&lt;ffffffe6e7b245dc&gt;] __kmem_cache_alloc_node+0x1e4/0x2d8
    [&lt;ffffffe6e7adde88&gt;] kmalloc_trace+0x48/0x110
    [&lt;ffffffe6bbd765fc&gt;] ath10k_wmi_tlv_op_gen_mgmt_tx_send+0xd4/0x1d8 [ath10k_core]
    [&lt;ffffffe6bbd3eed4&gt;] ath10k_mgmt_over_wmi_tx_work+0x134/0x298 [ath10k_core]
    [&lt;ffffffe6e78d5974&gt;] process_scheduled_works+0x1ac/0x400
    [&lt;ffffffe6e78d60b8&gt;] worker_thread+0x208/0x328
    [&lt;ffffffe6e78dc890&gt;] kthread+0x100/0x1c0
    [&lt;ffffffe6e78166c0&gt;] ret_from_fork+0x10/0x20

Free the memory during completion and cleanup to fix the leak.

Protect the mgmt_pending_tx idr_remove() operation in
ath10k_wmi_tlv_op_cleanup_mgmt_tx_send() using ar-&gt;data_lock similar to
other instances.

Tested-on: WCN3990 hw1.0 SNOC WLAN.HL.2.0-01387-QCAHLSWMTPLZ-1</Note>
    </Notes>
    <CVE>CVE-2024-50236</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50236.html</URL>
        <Description>CVE-2024-50236</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233212</URL>
        <Description>SUSE Bug 1233212</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="55">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower

Avoid potentially crashing in the driver because of uninitialized private data</Note>
    </Notes>
    <CVE>CVE-2024-50237</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50237.html</URL>
        <Description>CVE-2024-50237</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233216</URL>
        <Description>SUSE Bug 1233216</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="56">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

vsock/virtio: Initialization of the dangling pointer occurring in vsk-&gt;trans

During loopback communication, a dangling pointer can be created in
vsk-&gt;trans, potentially leading to a Use-After-Free condition.  This
issue is resolved by initializing vsk-&gt;trans to NULL.</Note>
    </Notes>
    <CVE>CVE-2024-50264</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50264.html</URL>
        <Description>CVE-2024-50264</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233453</URL>
        <Description>SUSE Bug 1233453</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233712</URL>
        <Description>SUSE Bug 1233712</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="57">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove()

Syzkaller is able to provoke null-ptr-dereference in ocfs2_xa_remove():

[   57.319872] (a.out,1161,7):ocfs2_xa_remove:2028 ERROR: status = -12
[   57.320420] (a.out,1161,7):ocfs2_xa_cleanup_value_truncate:1999 ERROR: Partial truncate while removing xattr overlay.upper.  Leaking 1 clusters and removing the entry
[   57.321727] BUG: kernel NULL pointer dereference, address: 0000000000000004
[...]
[   57.325727] RIP: 0010:ocfs2_xa_block_wipe_namevalue+0x2a/0xc0
[...]
[   57.331328] Call Trace:
[   57.331477]  &lt;TASK&gt;
[...]
[   57.333511]  ? do_user_addr_fault+0x3e5/0x740
[   57.333778]  ? exc_page_fault+0x70/0x170
[   57.334016]  ? asm_exc_page_fault+0x2b/0x30
[   57.334263]  ? __pfx_ocfs2_xa_block_wipe_namevalue+0x10/0x10
[   57.334596]  ? ocfs2_xa_block_wipe_namevalue+0x2a/0xc0
[   57.334913]  ocfs2_xa_remove_entry+0x23/0xc0
[   57.335164]  ocfs2_xa_set+0x704/0xcf0
[   57.335381]  ? _raw_spin_unlock+0x1a/0x40
[   57.335620]  ? ocfs2_inode_cache_unlock+0x16/0x20
[   57.335915]  ? trace_preempt_on+0x1e/0x70
[   57.336153]  ? start_this_handle+0x16c/0x500
[   57.336410]  ? preempt_count_sub+0x50/0x80
[   57.336656]  ? _raw_read_unlock+0x20/0x40
[   57.336906]  ? start_this_handle+0x16c/0x500
[   57.337162]  ocfs2_xattr_block_set+0xa6/0x1e0
[   57.337424]  __ocfs2_xattr_set_handle+0x1fd/0x5d0
[   57.337706]  ? ocfs2_start_trans+0x13d/0x290
[   57.337971]  ocfs2_xattr_set+0xb13/0xfb0
[   57.338207]  ? dput+0x46/0x1c0
[   57.338393]  ocfs2_xattr_trusted_set+0x28/0x30
[   57.338665]  ? ocfs2_xattr_trusted_set+0x28/0x30
[   57.338948]  __vfs_removexattr+0x92/0xc0
[   57.339182]  __vfs_removexattr_locked+0xd5/0x190
[   57.339456]  ? preempt_count_sub+0x50/0x80
[   57.339705]  vfs_removexattr+0x5f/0x100
[...]

Reproducer uses faultinject facility to fail ocfs2_xa_remove() -&gt;
ocfs2_xa_value_truncate() with -ENOMEM.

In this case the comment mentions that we can return 0 if
ocfs2_xa_cleanup_value_truncate() is going to wipe the entry
anyway. But the following 'rc' check is wrong and execution flow do
'ocfs2_xa_remove_entry(loc);' twice:
* 1st: in ocfs2_xa_cleanup_value_truncate();
* 2nd: returning back to ocfs2_xa_remove() instead of going to 'out'.

Fix this by skipping the 2nd removal of the same entry and making
syzkaller repro happy.</Note>
    </Notes>
    <CVE>CVE-2024-50265</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50265.html</URL>
        <Description>CVE-2024-50265</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233454</URL>
        <Description>SUSE Bug 1233454</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="58">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

USB: serial: io_edgeport: fix use after free in debug printk

The "dev_dbg(&amp;urb-&gt;dev-&gt;dev, ..." which happens after usb_free_urb(urb)
is a use after free of the "urb" pointer.  Store the "dev" pointer at the
start of the function to avoid this issue.</Note>
    </Notes>
    <CVE>CVE-2024-50267</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50267.html</URL>
        <Description>CVE-2024-50267</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233456</URL>
        <Description>SUSE Bug 1233456</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233711</URL>
        <Description>SUSE Bug 1233711</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="59">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

btrfs: reinitialize delayed ref list after deleting it from the list

At insert_delayed_ref() if we need to update the action of an existing
ref to BTRFS_DROP_DELAYED_REF, we delete the ref from its ref head's
ref_add_list using list_del(), which leaves the ref's add_list member
not reinitialized, as list_del() sets the next and prev members of the
list to LIST_POISON1 and LIST_POISON2, respectively.

If later we end up calling drop_delayed_ref() against the ref, which can
happen during merging or when destroying delayed refs due to a transaction
abort, we can trigger a crash since at drop_delayed_ref() we call
list_empty() against the ref's add_list, which returns false since
the list was not reinitialized after the list_del() and as a consequence
we call list_del() again at drop_delayed_ref(). This results in an
invalid list access since the next and prev members are set to poison
pointers, resulting in a splat if CONFIG_LIST_HARDENED and
CONFIG_DEBUG_LIST are set or invalid poison pointer dereferences
otherwise.

So fix this by deleting from the list with list_del_init() instead.</Note>
    </Notes>
    <CVE>CVE-2024-50273</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50273.html</URL>
        <Description>CVE-2024-50273</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233462</URL>
        <Description>SUSE Bug 1233462</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="60">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

dm cache: fix potential out-of-bounds access on the first resume

Out-of-bounds access occurs if the fast device is expanded unexpectedly
before the first-time resume of the cache table. This happens because
expanding the fast device requires reloading the cache table for
cache_create to allocate new in-core data structures that fit the new
size, and the check in cache_preresume is not performed during the
first resume, leading to the issue.

Reproduce steps:

1. prepare component devices:

dmsetup create cmeta --table "0 8192 linear /dev/sdc 0"
dmsetup create cdata --table "0 65536 linear /dev/sdc 8192"
dmsetup create corig --table "0 524288 linear /dev/sdc 262144"
dd if=/dev/zero of=/dev/mapper/cmeta bs=4k count=1 oflag=direct

2. load a cache table of 512 cache blocks, and deliberately expand the
   fast device before resuming the cache, making the in-core data
   structures inadequate.

dmsetup create cache --notable
dmsetup reload cache --table "0 524288 cache /dev/mapper/cmeta \
/dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0"
dmsetup reload cdata --table "0 131072 linear /dev/sdc 8192"
dmsetup resume cdata
dmsetup resume cache

3. suspend the cache to write out the in-core dirty bitset and hint
   array, leading to out-of-bounds access to the dirty bitset at offset
   0x40:

dmsetup suspend cache

KASAN reports:

  BUG: KASAN: vmalloc-out-of-bounds in is_dirty_callback+0x2b/0x80
  Read of size 8 at addr ffffc90000085040 by task dmsetup/90

  (...snip...)
  The buggy address belongs to the virtual mapping at
   [ffffc90000085000, ffffc90000087000) created by:
   cache_ctr+0x176a/0x35f0

  (...snip...)
  Memory state around the buggy address:
   ffffc90000084f00: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
   ffffc90000084f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
  &gt;ffffc90000085000: 00 00 00 00 00 00 00 00 f8 f8 f8 f8 f8 f8 f8 f8
                                             ^
   ffffc90000085080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
   ffffc90000085100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8

Fix by checking the size change on the first resume.</Note>
    </Notes>
    <CVE>CVE-2024-50278</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50278.html</URL>
        <Description>CVE-2024-50278</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233467</URL>
        <Description>SUSE Bug 1233467</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233709</URL>
        <Description>SUSE Bug 1233709</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="61">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

dm cache: fix out-of-bounds access to the dirty bitset when resizing

dm-cache checks the dirty bits of the cache blocks to be dropped when
shrinking the fast device, but an index bug in bitset iteration causes
out-of-bounds access.

Reproduce steps:

1. create a cache device of 1024 cache blocks (128 bytes dirty bitset)

dmsetup create cmeta --table "0 8192 linear /dev/sdc 0"
dmsetup create cdata --table "0 131072 linear /dev/sdc 8192"
dmsetup create corig --table "0 524288 linear /dev/sdc 262144"
dd if=/dev/zero of=/dev/mapper/cmeta bs=4k count=1 oflag=direct
dmsetup create cache --table "0 524288 cache /dev/mapper/cmeta \
/dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0"

2. shrink the fast device to 512 cache blocks, triggering out-of-bounds
   access to the dirty bitset (offset 0x80)

dmsetup suspend cache
dmsetup reload cdata --table "0 65536 linear /dev/sdc 8192"
dmsetup resume cdata
dmsetup resume cache

KASAN reports:

  BUG: KASAN: vmalloc-out-of-bounds in cache_preresume+0x269/0x7b0
  Read of size 8 at addr ffffc900000f3080 by task dmsetup/131

  (...snip...)
  The buggy address belongs to the virtual mapping at
   [ffffc900000f3000, ffffc900000f5000) created by:
   cache_ctr+0x176a/0x35f0

  (...snip...)
  Memory state around the buggy address:
   ffffc900000f2f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
   ffffc900000f3000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  &gt;ffffc900000f3080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
                     ^
   ffffc900000f3100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
   ffffc900000f3180: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8

Fix by making the index post-incremented.</Note>
    </Notes>
    <CVE>CVE-2024-50279</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50279.html</URL>
        <Description>CVE-2024-50279</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233468</URL>
        <Description>SUSE Bug 1233468</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233708</URL>
        <Description>SUSE Bug 1233708</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="62">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

media: av7110: fix a spectre vulnerability

As warned by smatch:
	drivers/staging/media/av7110/av7110_ca.c:270 dvb_ca_ioctl() warn: potential spectre issue 'av7110-&gt;ci_slot' [w] (local cap)

There is a spectre-related vulnerability at the code. Fix it.</Note>
    </Notes>
    <CVE>CVE-2024-50289</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50289.html</URL>
        <Description>CVE-2024-50289</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233478</URL>
        <Description>SUSE Bug 1233478</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="63">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

media: cx24116: prevent overflows on SNR calculus

as reported by Coverity, if reading SNR registers fail, a negative
number will be returned, causing an underflow when reading SNR
registers.

Prevent that.</Note>
    </Notes>
    <CVE>CVE-2024-50290</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50290.html</URL>
        <Description>CVE-2024-50290</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225742</URL>
        <Description>SUSE Bug 1225742</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233479</URL>
        <Description>SUSE Bug 1233479</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233681</URL>
        <Description>SUSE Bug 1233681</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="64">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: hns3: fix kernel crash when uninstalling driver

When the driver is uninstalled and the VF is disabled concurrently, a
kernel crash occurs. The reason is that the two actions call function
pci_disable_sriov(). The num_VFs is checked to determine whether to
release the corresponding resources. During the second calling, num_VFs
is not 0 and the resource release function is called. However, the
corresponding resource has been released during the first invoking.
Therefore, the problem occurs:

[15277.839633][T50670] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000020
...
[15278.131557][T50670] Call trace:
[15278.134686][T50670]  klist_put+0x28/0x12c
[15278.138682][T50670]  klist_del+0x14/0x20
[15278.142592][T50670]  device_del+0xbc/0x3c0
[15278.146676][T50670]  pci_remove_bus_device+0x84/0x120
[15278.151714][T50670]  pci_stop_and_remove_bus_device+0x6c/0x80
[15278.157447][T50670]  pci_iov_remove_virtfn+0xb4/0x12c
[15278.162485][T50670]  sriov_disable+0x50/0x11c
[15278.166829][T50670]  pci_disable_sriov+0x24/0x30
[15278.171433][T50670]  hnae3_unregister_ae_algo_prepare+0x60/0x90 [hnae3]
[15278.178039][T50670]  hclge_exit+0x28/0xd0 [hclge]
[15278.182730][T50670]  __se_sys_delete_module.isra.0+0x164/0x230
[15278.188550][T50670]  __arm64_sys_delete_module+0x1c/0x30
[15278.193848][T50670]  invoke_syscall+0x50/0x11c
[15278.198278][T50670]  el0_svc_common.constprop.0+0x158/0x164
[15278.203837][T50670]  do_el0_svc+0x34/0xcc
[15278.207834][T50670]  el0_svc+0x20/0x30

For details, see the following figure.

     rmmod hclge              disable VFs
----------------------------------------------------
hclge_exit()            sriov_numvfs_store()
  ...                     device_lock()
  pci_disable_sriov()     hns3_pci_sriov_configure()
                            pci_disable_sriov()
                              sriov_disable()
    sriov_disable()             if !num_VFs :
      if !num_VFs :               return;
        return;                 sriov_del_vfs()
      sriov_del_vfs()             ...
        ...                       klist_put()
        klist_put()               ...
        ...                     num_VFs = 0;
      num_VFs = 0;        device_unlock();

In this patch, when driver is removing, we get the device_lock()
to protect num_VFs, just like sriov_numvfs_store().</Note>
    </Notes>
    <CVE>CVE-2024-50296</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50296.html</URL>
        <Description>CVE-2024-50296</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233485</URL>
        <Description>SUSE Bug 1233485</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="65">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

security/keys: fix slab-out-of-bounds in key_task_permission

KASAN reports an out of bounds read:
BUG: KASAN: slab-out-of-bounds in __kuid_val include/linux/uidgid.h:36
BUG: KASAN: slab-out-of-bounds in uid_eq include/linux/uidgid.h:63 [inline]
BUG: KASAN: slab-out-of-bounds in key_task_permission+0x394/0x410
security/keys/permission.c:54
Read of size 4 at addr ffff88813c3ab618 by task stress-ng/4362

CPU: 2 PID: 4362 Comm: stress-ng Not tainted 5.10.0-14930-gafbffd6c3ede #15
Call Trace:
 __dump_stack lib/dump_stack.c:82 [inline]
 dump_stack+0x107/0x167 lib/dump_stack.c:123
 print_address_description.constprop.0+0x19/0x170 mm/kasan/report.c:400
 __kasan_report.cold+0x6c/0x84 mm/kasan/report.c:560
 kasan_report+0x3a/0x50 mm/kasan/report.c:585
 __kuid_val include/linux/uidgid.h:36 [inline]
 uid_eq include/linux/uidgid.h:63 [inline]
 key_task_permission+0x394/0x410 security/keys/permission.c:54
 search_nested_keyrings+0x90e/0xe90 security/keys/keyring.c:793

This issue was also reported by syzbot.

It can be reproduced by following these steps(more details [1]):
1. Obtain more than 32 inputs that have similar hashes, which ends with the
   pattern '0xxxxxxxe6'.
2. Reboot and add the keys obtained in step 1.

The reproducer demonstrates how this issue happened:
1. In the search_nested_keyrings function, when it iterates through the
   slots in a node(below tag ascend_to_node), if the slot pointer is meta
   and node-&gt;back_pointer != NULL(it means a root), it will proceed to
   descend_to_node. However, there is an exception. If node is the root,
   and one of the slots points to a shortcut, it will be treated as a
   keyring.
2. Whether the ptr is keyring decided by keyring_ptr_is_keyring function.
   However, KEYRING_PTR_SUBTYPE is 0x2UL, the same as
   ASSOC_ARRAY_PTR_SUBTYPE_MASK.
3. When 32 keys with the similar hashes are added to the tree, the ROOT
   has keys with hashes that are not similar (e.g. slot 0) and it splits
   NODE A without using a shortcut. When NODE A is filled with keys that
   all hashes are xxe6, the keys are similar, NODE A will split with a
   shortcut. Finally, it forms the tree as shown below, where slot 6 points
   to a shortcut.

                      NODE A
              +------&gt;+---+
      ROOT    |       | 0 | xxe6
      +---+   |       +---+
 xxxx | 0 | shortcut  :   : xxe6
      +---+   |       +---+
 xxe6 :   :   |       |   | xxe6
      +---+   |       +---+
      | 6 |---+       :   : xxe6
      +---+           +---+
 xxe6 :   :           | f | xxe6
      +---+           +---+
 xxe6 | f |
      +---+

4. As mentioned above, If a slot(slot 6) of the root points to a shortcut,
   it may be mistakenly transferred to a key*, leading to a read
   out-of-bounds read.

To fix this issue, one should jump to descend_to_node if the ptr is a
shortcut, regardless of whether the node is root or not.

[1] https://lore.kernel.org/linux-kernel/1cfa878e-8c7b-4570-8606-21daf5e13ce7@huaweicloud.com/

[jarkko: tweaked the commit message a bit to have an appropriate closes
 tag.]</Note>
    </Notes>
    <CVE>CVE-2024-50301</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50301.html</URL>
        <Description>CVE-2024-50301</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233490</URL>
        <Description>SUSE Bug 1233490</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233680</URL>
        <Description>SUSE Bug 1233680</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="66">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

HID: core: zero-initialize the report buffer

Since the report buffer is used by all kinds of drivers in various ways, let's
zero-initialize it during allocation to make sure that it can't be ever used
to leak kernel memory via specially-crafted report.</Note>
    </Notes>
    <CVE>CVE-2024-50302</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50302.html</URL>
        <Description>CVE-2024-50302</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233491</URL>
        <Description>SUSE Bug 1233491</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233679</URL>
        <Description>SUSE Bug 1233679</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="67">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2024-53058</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53058.html</URL>
        <Description>CVE-2024-53058</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233552</URL>
        <Description>SUSE Bug 1233552</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="68">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2024-53061</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53061.html</URL>
        <Description>CVE-2024-53061</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233555</URL>
        <Description>SUSE Bug 1233555</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233621</URL>
        <Description>SUSE Bug 1233621</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="69">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2024-53063</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53063.html</URL>
        <Description>CVE-2024-53063</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225742</URL>
        <Description>SUSE Bug 1225742</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233557</URL>
        <Description>SUSE Bug 1233557</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233619</URL>
        <Description>SUSE Bug 1233619</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="70">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2024-53066</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53066.html</URL>
        <Description>CVE-2024-53066</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233560</URL>
        <Description>SUSE Bug 1233560</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="71">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tpm: Lock TPM chip in tpm_pm_suspend() first

Setting TPM_CHIP_FLAG_SUSPENDED in the end of tpm_pm_suspend() can be racy
according, as this leaves window for tpm_hwrng_read() to be called while
the operation is in progress. The recent bug report gives also evidence of
this behaviour.

Aadress this by locking the TPM chip before checking any chip-&gt;flags both
in tpm_pm_suspend() and tpm_hwrng_read(). Move TPM_CHIP_FLAG_SUSPENDED
check inside tpm_get_random() so that it will be always checked only when
the lock is reserved.</Note>
    </Notes>
    <CVE>CVE-2024-53085</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53085.html</URL>
        <Description>CVE-2024-53085</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233577</URL>
        <Description>SUSE Bug 1233577</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="72">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

i40e: fix race condition by adding filter's intermediate sync state

Fix a race condition in the i40e driver that leads to MAC/VLAN filters
becoming corrupted and leaking. Address the issue that occurs under
heavy load when multiple threads are concurrently modifying MAC/VLAN
filters by setting mac and port VLAN.

1. Thread T0 allocates a filter in i40e_add_filter() within
        i40e_ndo_set_vf_port_vlan().
2. Thread T1 concurrently frees the filter in __i40e_del_filter() within
        i40e_ndo_set_vf_mac().
3. Subsequently, i40e_service_task() calls i40e_sync_vsi_filters(), which
        refers to the already freed filter memory, causing corruption.

Reproduction steps:
1. Spawn multiple VFs.
2. Apply a concurrent heavy load by running parallel operations to change
        MAC addresses on the VFs and change port VLANs on the host.
3. Observe errors in dmesg:
"Error I40E_AQ_RC_ENOSPC adding RX filters on VF XX,
	please set promiscuous on manually for VF XX".

Exact code for stable reproduction Intel can't open-source now.

The fix involves implementing a new intermediate filter state,
I40E_FILTER_NEW_SYNC, for the time when a filter is on a tmp_add_list.
These filters cannot be deleted from the hash list directly but
must be removed using the full process.</Note>
    </Notes>
    <CVE>CVE-2024-53088</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53088.html</URL>
        <Description>CVE-2024-53088</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233580</URL>
        <Description>SUSE Bug 1233580</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="73">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format

This can lead to out of bounds writes since frames of this type were not
taken into account when calculating the size of the frames buffer in
uvc_parse_streaming.</Note>
    </Notes>
    <CVE>CVE-2024-53104</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53104.html</URL>
        <Description>CVE-2024-53104</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234025</URL>
        <Description>SUSE Bug 1234025</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1236783</URL>
        <Description>SUSE Bug 1236783</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="74">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client

A number of Zen4 client SoCs advertise the ability to use virtualized
VMLOAD/VMSAVE, but using these instructions is reported to be a cause
of a random host reboot.

These instructions aren't intended to be advertised on Zen4 client
so clear the capability.</Note>
    </Notes>
    <CVE>CVE-2024-53114</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53114.html</URL>
        <Description>CVE-2024-53114</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234072</URL>
        <Description>SUSE Bug 1234072</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="75">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

initramfs: avoid filename buffer overrun

The initramfs filename field is defined in
Documentation/driver-api/early-userspace/buffer-format.rst as:

 37 cpio_file := ALGN(4) + cpio_header + filename + "\0" + ALGN(4) + data
...
 55 ============= ================== =========================
 56 Field name    Field size         Meaning
 57 ============= ================== =========================
...
 70 c_namesize    8 bytes            Length of filename, including final \0

When extracting an initramfs cpio archive, the kernel's do_name() path
handler assumes a zero-terminated path at @collected, passing it
directly to filp_open() / init_mkdir() / init_mknod().

If a specially crafted cpio entry carries a non-zero-terminated filename
and is followed by uninitialized memory, then a file may be created with
trailing characters that represent the uninitialized memory. The ability
to create an initramfs entry would imply already having full control of
the system, so the buffer overrun shouldn't be considered a security
vulnerability.

Append the output of the following bash script to an existing initramfs
and observe any created /initramfs_test_fname_overrunAA* path. E.g.
  ./reproducer.sh | gzip &gt;&gt; /myinitramfs

It's easiest to observe non-zero uninitialized memory when the output is
gzipped, as it'll overflow the heap allocated @out_buf in __gunzip(),
rather than the initrd_start+initrd_size block.

---- reproducer.sh ----
nilchar="A"	# change to "\0" to properly zero terminate / pad
magic="070701"
ino=1
mode=$(( 0100777 ))
uid=0
gid=0
nlink=1
mtime=1
filesize=0
devmajor=0
devminor=1
rdevmajor=0
rdevminor=0
csum=0
fname="initramfs_test_fname_overrun"
namelen=$(( ${#fname} + 1 ))	# plus one to account for terminator

printf "%s%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%s" \
	$magic $ino $mode $uid $gid $nlink $mtime $filesize \
	$devmajor $devminor $rdevmajor $rdevminor $namelen $csum $fname

termpadlen=$(( 1 + ((4 - ((110 + $namelen) &amp; 3)) % 4) ))
printf "%.s${nilchar}" $(seq 1 $termpadlen)
---- reproducer.sh ----

Symlink filename fields handled in do_symlink() won't overrun past the
data segment, due to the explicit zero-termination of the symlink
target.

Fix filename buffer overrun by aborting the initramfs FSM if any cpio
entry doesn't carry a zero-terminator at the expected (name_len - 1)
offset.</Note>
    </Notes>
    <CVE>CVE-2024-53142</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-Azure-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:dlm-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:gfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:kernel-default-4.12.14-122.237.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ocfs2-kmp-default-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.237.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_237-default-1-8.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53142.html</URL>
        <Description>CVE-2024-53142</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232436</URL>
        <Description>SUSE Bug 1232436</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
