<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:4376-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-12-18T15:03:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-12-18T15:03:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-12-18T15:03:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">

The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2021-47594: mptcp: never allow the PM to close a listener subflow (bsc#1226560).
- CVE-2022-48983: io_uring: Fix a null-ptr-deref in io_tctx_exit_cb() (bsc#1231959).
- CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590).
- CVE-2024-26906: Fixed invalid vsyscall page read for copy_from_kernel_nofault() (bsc#1223202).
- CVE-2024-26953: net: esp: fix bad handling of pages from page_pool (bsc#1223656).
- CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb-&gt;head (bsc#1224518).
- CVE-2024-35937: wifi: cfg80211: check A-MSDU format more carefully (bsc#1224526).
- CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725).
- CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).
- CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (bsc#1225742).
- CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append (bsc#1225764).
- CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl() (bsc#1226748).
- CVE-2024-38615: cpufreq: exit() callback is optional (bsc#1226592).
- CVE-2024-40997: cpufreq: amd-pstate: fix memory leak on CPU EPP exit (bsc#1227853).
- CVE-2024-41023: sched/deadline: Fix task_struct reference leak (bsc#1228430).
- CVE-2024-44932: idpf: fix UAFs when destroying the queues (bsc#1229808).
- CVE-2024-44964: idpf: fix memory leaks and crashes while performing a soft reset (bsc#1230220).
- CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231).
- CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558).
- CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827).
- CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&amp;iput() (bsc#1231930).
- CVE-2024-47701: ext4: explicitly exit when ext4_find_inline_entry returns an error (bsc#1231920).
- CVE-2024-47745: mm: split critical region in remap_file_pages() and invoke LSMs in between (bsc#1232135).
- CVE-2024-47757: nilfs2: fix potential oob read in nilfs_btree_check_delete() (bsc#1232187).
- CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion (bsc#1232272).
- CVE-2024-49921: drm/amd/display: Check null pointers before used (bsc#1232371).
- CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224)
- CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name (bsc#1232387).
- CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165).
- CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159).
- CVE-2024-49968: ext4: fix error message when rejecting the default hash (bsc#1232264).
- CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free (bsc#1232096).
- CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module unload (bsc#1232483).
- CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value (bsc#1232318).
- CVE-2024-50073: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux (bsc#1232520).
- CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race (bsc#1232500).
- CVE-2024-50089: unicode: Do not special case ignorable code points (bsc#1232860).
- CVE-2024-50093: thermal: intel: int340x: processor: Fix warning during module unload (bsc#1232877).
- CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down (bsc#1232881).
- CVE-2024-50108: drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too (bsc#1232884).
- CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping (bsc#1232885).
- CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919).
- CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
- CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907).
- CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905).
- CVE-2024-50134: drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape (bsc#1232890).
- CVE-2024-50135: nvme-pci: fix race condition between reset and nvme_dev_disable() (bsc#1232888).
- CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935).
- CVE-2024-50146: net/mlx5e: Do not call cleanup on profile rollback failure (bsc#1233056).
- CVE-2024-50147: net/mlx5: Fix command bitmask initialization (bsc#1233067).
- CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in target_alloc_device() (bsc#1233061).
- CVE-2024-50154: tcp: Fix use-after-free of nreq in reqsk_timer_handler() (bsc#1233070).
- CVE-2024-50167: be2net: fix potential memory leak in be_xmit() (bsc#1233049).
- CVE-2024-50171: net: systemport: fix potential memory leak in bcm_sysport_xmit() (bsc#1233057).
- CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct map (bsc#1233129).
- CVE-2024-50184: virtio_pmem: Check device status before requesting flush (bsc#1233135).
- CVE-2024-50186: net: explicitly clear the sk pointer, when pf-&gt;create fails (bsc#1233110).
- CVE-2024-50188: net: phy: dp83869: fix memory corruption when enabling fiber (bsc#1233107).
- CVE-2024-50192: irqchip/gic-v4: Correctly deal with set_affinity on lazily-mapped VPEs (bsc#1233106).
- CVE-2024-50195: posix-clock: posix-clock: Fix unbalanced locking in pc_clock_settime() (bsc#1233103).
- CVE-2024-50196: pinctrl: ocelot: fix system hang on level based interrupts (bsc#1233113).
- CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (bsc#1233293).
- CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (bsc#1233117).
- CVE-2024-50229: nilfs2: fix potential deadlock with newly created symlinks (bsc#1233205).
- CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked flag (bsc#1233206).
- CVE-2024-50259: netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write() (bsc#1233214).
- CVE-2024-50261: macsec: Fix use-after-free while sending the offloading packet (bsc#1233253).
- CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk-&gt;trans (bsc#1233453).
- CVE-2024-50267: USB: serial: io_edgeport: fix use after free in debug printk (bsc#1233456).
- CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460).
- CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from the list (bsc#1233462).
- CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings (bsc#1233463).
- CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468).
- CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).
- CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single (bsc#1233484).
- CVE-2024-50298: net: enetc: allocate vf_state during PF probes (bsc#1233487).
- CVE-2024-53052: io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (bsc#1233548).
- CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data (bsc#1233552).
- CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555).
- CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access (bsc#1233557).
- CVE-2024-53068: firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() (bsc#1233561).
- CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking (bsc#1233570).
- CVE-2024-53088: i40e: fix race condition by adding filter's intermediate sync state (bsc#1233580).
- CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).
- CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error (bsc#1234085).

The following non-security bugs were fixed:

- Drop OCFS2 patch causing a regression (bsc#1233255).
- Fix regression on AMDGPU driver (bsc#1233134).
- Removed the duplicated check of static_assert(sizeof(struct work_struct) &gt;= sizeof(struct rcu_head)).
- Revert 'cgroup: Fix memory leak caused by missing cgroup_bpf_offline' (bsc#1234108).
- Revert 'ixgbe: Manual AN-37 for troublesome link partners for X550 SFI' (git-fixes).
- Revert 'mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K' (git-fixes).
- Revert 'usb: gadget: composite: fix OS descriptors w_value logic' (git-fixes).
- Update config files (bsc#1218644). 
- Update config files. Enabled IDPF for ARM64 (bsc#1221309)
- acpi: CPPC: Fix _CPC register setting issue (git-fixes).
- acpi: CPPC: Make rmw_lock a raw_spin_lock (git-fixes).
- acpi: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid detection issue (stable-fixes).
- acpi: resource: Add LG 16T90SP to irq1_level_low_skip_override[] (stable-fixes).
- ad7780: fix division by zero in ad7780_write_raw() (git-fixes).
- add bugreference to a hv_netvsc patch (bsc#1232413).
- alsa: 6fire: Release resources at card release (git-fixes).
- alsa: ac97: bus: Fix the mistake in the comment (git-fixes).
- alsa: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes).
- alsa: firewire-lib: fix return value on fail in amdtp_tscm_init() (git-fixes).
- alsa: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes).
- alsa: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 (stable-fixes).
- alsa: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3 (stable-fixes).
- alsa: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1 (stable-fixes).
- alsa: hda/realtek: Limit internal Mic boost on Dell platform (stable-fixes).
- alsa: hda/realtek: Update ALC225 depop procedure (git-fixes).
- alsa: hda/realtek: Update ALC256 depop procedure (git-fixes).
- alsa: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable-fixes).
- alsa: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes).
- alsa: usb-audio: Add quirk for HP 320 FHD Webcam (stable-fixes).
- alsa: usb-audio: Add quirks for Dell WD19 dock (stable-fixes).
- alsa: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes).
- amd-pstate: Set min_perf to nominal_perf for active mode performance gov (git-fixes).
- arm64/sve: Discard stale CPU state when handling SVE traps (git-fixes)
- arm64: Force position-independent veneers (git-fixes).
- arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes).
- arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes)
- arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git-fixes)
- arm64: smccc: replace custom COUNT_ARGS() &amp; CONCATENATE() (git-fixes)
- arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git-fixes)
- arm64:uprobe fix the uprobe SWBP_INSN in big-endian (git-fixes)
- asoc: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes).
- asoc: codecs: Fix atomicity violation in snd_soc_component_get_drvdata() (git-fixes).
- asoc: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to default regs values (stable-fixes).
- asoc: cs42l51: Fix some error handling paths in cs42l51_probe() (git-fixes).
- asoc: fsl_sai: Enable 'FIFO continue on error' FCONT bit (stable-fixes).
- asoc: qcom: sm8250: add qrb4210-rb2-sndcard compatible string (stable-fixes).
- asoc: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git-fixes).
- blk-throttle: Fix io statistics for cgroup v1 (bsc#1233528).
- block: Avoid leaking hctx-&gt;nr_active counter on batched completion (bsc#1231923).
- bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git-fixes).
- bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (git-fixes).
- bnxt_en: Fix the PCI-AER routines (git-fixes).
- bnxt_en: Remove mis-applied code from bnxt_cfg_ntp_filters() (git-fixes).
- bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is down (git-fixes).
- bnxt_en: Reset PTP tx_avail after possible firmware reset (git-fixes).
- bnxt_en: Restore PTP tx_avail count in case of skb_pad() error (git-fixes).
- bnxt_en: Wait for FLR to complete during probe (git-fixes).
- bnxt_en: refactor reset close code (git-fixes).
- can: c_can: c_can_handle_bus_err(): update statistics if skb allocation fails (git-fixes).
- can: c_can: fix {rx,tx}_errors statistics (git-fixes).
- can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes).
- can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics (git-fixes).
- can: j1939: j1939_session_new(): fix skb reference counting (git-fixes).
- can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git-fixes).
- can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL (git-fixes).
- can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes).
- cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108).
- chtls: fix tp-&gt;rcv_tstamp initialization (git-fixes).
- comedi: Flush partial mappings in error case (git-fixes).
- crypto: bcm - add error check in the ahash_hmac_init function (git-fixes).
- crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes).
- crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes).
- crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git-fixes).
- crypto: cavium - Fix the if condition to exit loop after timeout (git-fixes).
- crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init() (git-fixes).
- crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes).
- cxgb4: Properly lock TX queue for the selftest (git-fixes).
- cxgb4: add forgotten u64 ivlan cast before shift (git-fixes).
- cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function (git-fixes).
- drivers: net: prevent tun_build_skb() to exceed the packet size limit (git-fixes).
- drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes).
- drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable-fixes).
- drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable-fixes).
- drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git-fixes).
- drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes).
- drm/bridge: tc358767: Fix link properties discovery (git-fixes).
- drm/bridge: tc358768: Fix DSI command tx (git-fixes).
- drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git-fixes).
- drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git-fixes).
- drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk() (git-fixes).
- drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes).
- drm/omap: Fix possible NULL dereference (git-fixes).
- drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes).
- drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes).
- drm/sti: avoid potential dereference of error pointers (git-fixes).
- drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check (git-fixes).
- drm/sti: avoid potential dereference of error pointers in sti_hqvdp_atomic_check (git-fixes).
- drm/v3d: Address race-condition in MMU flush (git-fixes).
- drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA (stable-fixes).
- drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes).
- drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git-fixes).
- drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git-fixes).
- drm/vmwgfx: Limit display layout ioctl array size to VMWGFX_NUM_DISPLAY_UNITS (stable-fixes).
- e1000e: Fix S0ix residency on corporate systems (git-fixes).
- efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465).
- eth: bnxt: fix counting packets discarded due to OOM and netpoll (git-fixes).
- firmware: google: Unregister driver_info on failure (git-fixes).
- genirq/msi: Fix off-by-one error in msi_domain_alloc() (git-fixes).
- goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes).
- gve: Fix XDP TX completion handling when counters overflow (git-fixes).
- gve: Fix an edge case for TSO skb validity check (git-fixes).
- gve: Fix skb truesize underestimation (git-fixes).
- gve: ignore nonrelevant GSO type bits when processing TSO headers (git-fixes).
- hid: core: zero-initialize the report buffer (git-fixes).
- hid: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable-fixes).
- hid: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable-fixes).
- hid: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad (stable-fixes).
- hid: multitouch: Add support for B2402FVA track point (stable-fixes).
- hid: wacom: Defer calculation of resolution until resolution_code is known (git-fixes).
- hid: wacom: Interpret tilt data from Intuos Pro BT as signed values (git-fixes).
- hid: wacom: fix when get product name maybe null pointer (git-fixes).
- hv_sock: Initializing vsk-&gt;trans to NULL to prevent a dangling pointer (git-fixes).
- hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes).
- i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git-fixes).
- i40e: Fix XDP program unloading while removing the driver (git-fixes).
- i40e: Fix filter input checks to prevent config with invalid values (git-fixes).
- i40e: Fix waiting for queues of all VSIs to be disabled (git-fixes).
- i40e: Report MFS in decimal base instead of hex (git-fixes).
- i40e: Restore VF MSI-X state during PCI reset (git-fixes).
- i40e: avoid double calling i40e_pf_rxq_wait() (git-fixes).
- i40e: disable NAPI right after disabling irqs when handling xsk_pool (git-fixes).
- i40e: fix use-after-free in i40e_aqc_add_filters() (git-fixes).
- i40e: take into account XDP Tx queues when stopping rings (git-fixes).
- iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes).
- iavf: Fix TC config comparison with existing adapter TC config (git-fixes).
- iavf: Fix promiscuous mode configuration flow messages (git-fixes).
- iavf: Introduce new state machines for flow director (git-fixes).
- iavf: do not process adminq tasks when __IAVF_IN_REMOVE_TASK is set (git-fixes).
- iavf: fix FDIR rule fields masks validation (git-fixes).
- iavf: in iavf_down, disable queues when removing the driver (git-fixes).
- iavf: initialize waitqueues before starting watchdog_task (git-fixes).
- iavf: send VLAN offloading caps once after VFR (git-fixes).
- iavf: validate tx_coalesce_usecs even if rx_coalesce_usecs is zero (git-fixes).
- ibmvnic: Do partial reset on login failure (bsc#1233150).
- ibmvnic: Enforce stronger sanity checks on login response (bsc#1233150).
- ibmvnic: Ensure login failure recovery is safe from other resets (bsc#1233150).
- ibmvnic: Handle DMA unmapping of login buffs in release functions (bsc#1233150).
- ibmvnic: Unmap DMA login rsp buffer on send login fail (bsc#1233150).
- ice: Block switchdev mode when ADQ is active and vice versa (git-fixes).
- ice: Fix NULL pointer deref during VF reset (git-fixes).
- ice: Fix VSI list rule with ICE_SW_LKUP_LAST type (git-fixes).
- ice: Fix link_down_on_close message (git-fixes).
- ice: Fix netif_is_ice() in Safe Mode (git-fixes).
- ice: Interpret .set_channels() input differently (git-fixes).
- ice: Shut down VSI with 'link-down-on-close' enabled (git-fixes).
- ice: avoid executing commands on other ports when driving sync (git-fixes).
- ice: change q_index variable type to s16 to store -1 value (git-fixes).
- ice: fix ICE_LAST_OFFSET formula (git-fixes).
- ice: fix VLAN replay after reset (git-fixes).
- ice: fix accounting for filters shared by multiple VSIs (git-fixes).
- ice: fix accounting if a VLAN already exists (git-fixes).
- ice: fix over-shifted variable (git-fixes).
- ice: fix receive buffer size miscalculation (git-fixes).
- ice: ice_aq_check_events: fix off-by-one check when filling buffer (git-fixes).
- ice: reset first in crash dump kernels (git-fixes).
- ice: respect netif readiness in AF_XDP ZC related ndo's (git-fixes).
- ice: tc: allow zero flags in parsing tc flower (git-fixes).
- ice: virtchnl: stop pretending to support RSS over AQ or registers (git-fixes).
- idpf: Interpret .set_channels() input differently (git-fixes).
- idpf: avoid compiler introduced padding in virtchnl2_rss_key struct (git-fixes).
- idpf: avoid compiler padding in virtchnl2_ptype struct (git-fixes).
- idpf: disable local BH when scheduling napi for marker packets (git-fixes).
- idpf: distinguish vports by the dev_port attribute (git-fixes).
- idpf: do not enable NAPI and interrupts prior to allocating Rx buffers (git-fixes).
- idpf: fix UAFs when destroying the queues (git-fixes).
- idpf: fix corrupted frames and skb leaks in singleq mode (git-fixes).
- idpf: fix memleak in vport interrupt configuration (git-fixes).
- idpf: fix memory leaks and crashes while performing a soft reset (git-fixes).
- igb: Always call igb_xdp_ring_update_tail() under Tx lock (git-fixes).
- igb: Fix missing time sync events (git-fixes).
- igb: Fix not clearing TimeSync interrupts for 82580 (git-fixes).
- igb: extend PTP timestamp adjustments to i211 (git-fixes).
- igc: Check VLAN EtherType mask (git-fixes).
- igc: Check VLAN TCI mask (git-fixes).
- igc: Fix hicredit calculation (git-fixes).
- igc: Fix missing time sync events (git-fixes).
- igc: Remove temporary workaround (git-fixes).
- igc: Report VLAN EtherType matching back to user (git-fixes).
- igc: Unlock on error in igc_io_resume() (git-fixes).
- iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() (git-fixes).
- iio: adc: ad7606: Fix typo in the driver name (git-fixes).
- iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes).
- iio: light: al3010: Fix an error handling path in al3010_probe() (git-fixes).
- iio: light: veml6030: fix microlux value calculation (git-fixes).
- initramfs: avoid filename buffer overrun (bsc#1232436).
- input: i8042 - add Ayaneo Kun to i8042 quirk table (git-fixes).
- input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table (git-fixes).
- input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk table (git-fixes).
- input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table (git-fixes).
- input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD line (git-fixes).
- irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes).
- irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1 (git-fixes).
- ixgbe: avoid sleeping allocation in ixgbe_ipsec_vf_add_sa() (git-fixes).
- ixgbe: fix crash with empty VF macvlan list (git-fixes).
- ixgbe: fix timestamp configuration code (git-fixes).
- ixgbe: {dis, en}able irqs in ixgbe_txrx_ring_{dis, en}able (git-fixes).
- kABI: Restore exported __arm_smccc_sve_check (git-fixes)
- kernel-binary: Enable livepatch package only when livepatch is enabled Otherwise the filelist may be empty failing the build (bsc#1218644).
- kernel.h: split out COUNT_ARGS() and CONCATENATE() to args.h (git-fixes)
- kexec: fix a memory leak in crash_shrink_memory() (git-fixes).
- kvm: PPC: Book3S HV: remove unused varible (bsc#1194869).
- mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING (git-fixes).
- media: adv7604: prevent underflow condition when reporting colorspace (git-fixes).
- media: cx24116: prevent overflows on SNR calculus (git-fixes).
- media: dvb-usb-v2: af9035: Fix null-ptr-deref in af9035_i2c_master_xfer (stable-fixes).
- media: dvb-usb-v2: af9035: fix missing unlock (git-fixes).
- media: dvb_frontend: do not play tricks with underflow values (git-fixes).
- media: dvbdev: prevent the risk of out of memory access (git-fixes).
- media: pci: cx23885: check cx23885_vdev_init() return (stable-fixes).
- media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes).
- media: stb0899_algo: initialize cfr before using it (git-fixes).
- media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes).
- media: v4l2-tpg: prevent the risk of a division by zero (git-fixes).
- mei: use kvmalloc for read buffer (git-fixes).
- misc: apds990x: Fix missing pm_runtime_disable() (git-fixes).
- mm/hugetlb: fix nodes huge page allocation when there are surplus pages (bsc#1234012).
- mm/memory: add non-anonymous page check in the copy_present_page() (bsc#1231646).
- modpost: remove incorrect code in do_eisa_entry() (git-fixes).
- net/mlx5: Add missing masks and QoS bit masks for scheduling elements (git-fixes).
- net/mlx5: Added cond_resched() to crdump collection (git-fixes).
- net/mlx5: Allow 0 for total host VFs (git-fixes).
- net/mlx5: Correctly compare pkt reformat ids (git-fixes).
- net/mlx5: DR, Can't go to uplink vport on RX rule (git-fixes).
- net/mlx5: DR, Use the right GVMI number for drop action (git-fixes).
- net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx (git-fixes).
- net/mlx5: Drain health before unregistering devlink (git-fixes).
- net/mlx5: E-switch, register event handler before arming the event (git-fixes).
- net/mlx5: Explicitly set scheduling element and TSAR type (git-fixes).
- net/mlx5: Fix fw tracer first block check (git-fixes).
- net/mlx5: Handle fw tracer change ownership event based on MTRC (git-fixes).
- net/mlx5: LAG, Check correct bucket when modifying LAG (git-fixes).
- net/mlx5: Lag, do bond only if slaves agree on roce state (git-fixes).
- net/mlx5: Lag, do not use the hardcoded value of the first port (git-fixes).
- net/mlx5: Lag, restore buckets number to default after hash LAG deactivation (git-fixes).
- net/mlx5: Skip clock update work when device is in error state (git-fixes).
- net/mlx5: Unregister notifier on eswitch init failure (git-fixes).
- net/mlx5: Update the list of the PCI supported devices (git-fixes).
- net/mlx5: Use RMW accessors for changing LNKCTL (git-fixes).
- net/mlx5: Use mlx5 device constant for selecting CQ period mode for ASO (git-fixes).
- net/mlx5: Use recovery timeout on sync reset flow (git-fixes).
- net/mlx5: fix potential memory leak in mlx5e_init_rep_rx (git-fixes).
- net/mlx5: fs, lock FTE when checking if active (git-fixes).
- net/mlx5e: Add a check for the return value from mlx5_port_set_eth_ptys (git-fixes).
- net/mlx5e: Add missing link modes to ptys2ethtool_map (git-fixes).
- net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup() (git-fixes).
- net/mlx5e: Again mutually exclude RX-FCS and RX-port-timestamp (git-fixes).
- net/mlx5e: Allow software parsing when IPsec crypto is enabled (git-fixes).
- net/mlx5e: CT: Fix null-ptr-deref in add rule err flow (git-fixes).
- net/mlx5e: Change the warning when ignore_flow_level is not supported (git-fixes).
- net/mlx5e: Check return value of snprintf writing to fw_version buffer (git-fixes).
- net/mlx5e: Check return value of snprintf writing to fw_version buffer for representors (git-fixes).
- net/mlx5e: Correct snprintf truncation handling for fw_version buffer (git-fixes).
- net/mlx5e: Correct snprintf truncation handling for fw_version buffer used by representors (git-fixes).
- net/mlx5e: Correctly report errors for ethtool rx flows (git-fixes).
- net/mlx5e: Do not offload internal port if filter device is out device (git-fixes).
- net/mlx5e: Fix IPsec tunnel mode offload feature check (git-fixes).
- net/mlx5e: Fix UDP GSO for encapsulated packets (git-fixes).
- net/mlx5e: Fix crash moving to switchdev mode when ntuple offload is set (git-fixes).
- net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN) packets (git-fixes).
- net/mlx5e: Fix pedit endianness (git-fixes).
- net/mlx5e: Fix possible deadlock on mlx5e_tx_timeout_work (git-fixes).
- net/mlx5e: Fix slab-out-of-bounds in mlx5_query_nic_vport_mac_list() (git-fixes).
- net/mlx5e: HTB, Fix inconsistencies with QoS SQs number (git-fixes).
- net/mlx5e: Move representor neigh cleanup to profile cleanup_tx (git-fixes).
- net/mlx5e: Reduce the size of icosq_str (git-fixes).
- net/mlx5e: Take state lock during tx timeout reporter (git-fixes).
- net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting buffer exhaustion (git-fixes).
- net/mlx5e: fix a potential double-free in fs_udp_create_groups (git-fixes).
- net/mlx5e: fix double free in macsec_fs_tx_create_crypto_table_groups (git-fixes).
- net/mlx5e: fix double free of encap_header (git-fixes).
- net/mlx5e: fix return value check in mlx5e_ipsec_remove_trailer() (git-fixes).
- net/mlx5e: kTLS, Fix incorrect page refcounting (git-fixes).
- net: ena: Fix potential sign extension issue (git-fixes).
- net: ena: Remove ena_select_queue (git-fixes).
- net: ena: Wrong missing IO completions check order (git-fixes).
- net: qede: use return from qede_parse_flow_attr() for flow_spec (git-fixes).
- net: relax socket state check at accept time (git-fixes).
- net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device (git-fixes).
- net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL configuration (git-fixes).
- net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes).
- net: usb: usbnet: fix race in probe failure (git-fixes).
- nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes).
- nvme-fabrics: fix kernel crash while shutting down controller (git-fixes).
- nvme-pci: fix freeing of the HMB descriptor table (git-fixes).
- nvme-pci: reverse request order in nvme_queue_rqs (git-fixes).
- ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() (git-fixes).
- pci: Add T_PVPERL macro (git-fixes).
- pci: Fix reset_method_store() memory leak (git-fixes).
- pci: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf() (git-fixes).
- pci: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds (git-fixes).
- pci: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes).
- pci: keystone: Set mode as Root Complex for 'ti,keystone-pcie' compatible (git-fixes).
- pci: rockchip-ep: Fix address translation unit programming (git-fixes).
- phy: tegra: xusb: Add error pointer check in xusb.c (git-fixes).
- platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git-fixes).
- platform/surface: aggregator: Fix warning when controller is destroyed in probe (git-fixes).
- platform/x86: dell-sysman: add support for alienware products (stable-fixes).
- platform/x86: dell-wmi: Ignore suspend notifications (stable-fixes).
- posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098).
- power: supply: bq27xxx: Fix registers of bq27426 (git-fixes).
- power: supply: core: Remove might_sleep() from power_supply_put() (git-fixes).
- powerpc/asm: Remove UPD_CONSTR after GCC 4.9 removal (bsc#1194869).
- powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869).
- powerpc/kexec: Fix return of uninitialized variable (bsc#1194869).
- powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869).
- powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869).
- powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL (bsc#1194869).
- powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869).
- powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector (bsc#1194869).
- powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869).
- powerpc: remove GCC version check for UPD_CONSTR (bsc#1194869).
- qed: avoid truncating work queue length (git-fixes).
- rdma/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes)
- rdma/hns: Add clear_hem return value to log (git-fixes)
- rdma/hns: Add mutex_destroy() (git-fixes)
- rdma/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes)
- rdma/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci (git-fixes)
- rdma/hns: Fix cpu stuck caused by printings during reset (git-fixes)
- rdma/hns: Fix different dgids mapping to the same dip_idx (git-fixes)
- rdma/hns: Fix flush cqe error when racing with destroy qp (git-fixes)
- rdma/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes)
- rdma/hns: Remove unnecessary QP type checks (git-fixes)
- rdma/hns: Use dev_* printings in hem code instead of ibdev_* (git-fixes)
- rdma/hns: Use macro instead of magic number (git-fixes)
- rdma/mlx5: Move events notifier registration to be after device registration (git-fixes)
- rdma/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled (git-fixes).
- rdma/rxe: Fix the qp flush warnings in req (git-fixes)
- rdma/rxe: Set queue pair cur_qp_state when being queried (git-fixes)
- rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed by the new klp-convert implementation. (bsc#1218644)
- rtc: ab-eoz9: do not fail temperature reads on undervoltage notification (git-fixes).
- rtc: abx80x: Fix WDT bit position of the status register (git-fixes).
- rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git-fixes).
- rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241).
- scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths (bsc#1233241).
- scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241).
- scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up FDMI (bsc#1233241).
- scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs (bsc#1233241).
- scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241).
- scsi: lpfc: Modify CGN warning signal calculation based on EDC response (bsc#1233241).
- scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback (bsc#1233241).
- scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241).
- scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241).
- scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG flag (bsc#1233241).
- scsi: scsi_transport_fc: Allow setting rport state to current state (git-fixes).
- scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes).
- security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes).
- serial: 8250: omap: Move pm_runtime_get_sync (git-fixes).
- sfc: Check firmware supports Ethernet PTP filter (git-fixes).
- sfc: do not unregister flow_indr if it was never registered (git-fixes).
- sfc: fix a double-free bug in efx_probe_filters (git-fixes).
- signal: Replace BUG_ON()s (bsc#1234093).
- spi: Fix acpi deferred irq probe (git-fixes).
- spi: atmel-quadspi: Fix register name in verbose logging function (git-fixes).
- staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg() (git-fixes).
- thermal: core: Initialize thermal zones before registering them (git-fixes).
- thermal: intel: int340x: processor: Fix warning during module unload (git-fixes).
- tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes).
- tun: Fix xdp_rxq_info's queue_index when detaching (git-fixes).
- tun: prevent negative ifindex (git-fixes).
- ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460).
- usb: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes).
- usb: chaoskey: fail open after removal (git-fixes).
- usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing logic (git-fixes).
- usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes).
- usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes).
- usb: ehci-spear: fix call balance of sehci clk handling routines (git-fixes).
- usb: musb: sunxi: Fix accessing an released usb phy (git-fixes).
- usb: phy: Fix API devm_usb_put_phy() can not release the phy (git-fixes).
- usb: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git-fixes).
- usb: serial: io_edgeport: fix use after free in debug printk (git-fixes).
- usb: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes).
- usb: serial: option: add Quectel RG650V (stable-fixes).
- usb: serial: qcserial: add support for Sierra Wireless EM86xx (stable-fixes).
- usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() (git-fixes).
- usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes() (git-fixes).
- usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read() (git-fixes).
- usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes).
- usb: yurex: make waiting on yurex_write interruptible (git-fixes).
- usbip: tools: Fix detach_port() invalid port error path (git-fixes).
- vdpa/mlx5: preserve CVQ vringh index (git-fixes).
- watchdog: mediatek: Make sure system reset gets asserted in mtk_wdt_restart() (git-fixes).
- watchdog: rti: of: honor timeout-sec property (git-fixes).
- wifi: ath10k: Fix memory leak in management tx (git-fixes).
- wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1 (git-fixes).
- wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2 (git-fixes).
- wifi: ath11k: Fix invalid ring usage in full monitor mode (git-fixes).
- wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (git-fixes).
- wifi: brcm80211: BRCM_TRACING should depend on TRACING (git-fixes).
- wifi: iwlegacy: Clear stale interrupts before resuming device (stable-fixes).
- wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd() (git-fixes).
- wifi: iwlwifi: mvm: disconnect station vifs if recovery failed (stable-fixes).
- wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower (git-fixes).
- wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys (git-fixes).
- wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (git-fixes).
- wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- x86/kvm: fix is_stale_page_fault() (bsc#1221333).
- xhci: Fix Link TRB DMA in command ring stopped completion event (git-fixes).
- xhci: Separate PORT and CAPs macros into dedicated file (stable-fixes).
- xhci: Use pm_runtime_get to prevent RPM on unsupported systems (git-fixes).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Image SLES15-SP5-Azure-3P-2024-4376,Image SLES15-SP5-Azure-Basic-2024-4376,Image SLES15-SP5-Azure-Standard-2024-4376,Image SLES15-SP5-HPC-Azure-2024-4376,SUSE-2024-4376,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-4376,openSUSE-SLE-15.5-2024-4376</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      <Description>Link for SUSE-SU-2024:4376-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:4376-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1082555</URL>
      <Description>SUSE Bug 1082555</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1194869</URL>
      <Description>SUSE Bug 1194869</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218644</URL>
      <Description>SUSE Bug 1218644</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1220382</URL>
      <Description>SUSE Bug 1220382</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221309</URL>
      <Description>SUSE Bug 1221309</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221333</URL>
      <Description>SUSE Bug 1221333</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222364</URL>
      <Description>SUSE Bug 1222364</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222590</URL>
      <Description>SUSE Bug 1222590</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223202</URL>
      <Description>SUSE Bug 1223202</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223656</URL>
      <Description>SUSE Bug 1223656</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223848</URL>
      <Description>SUSE Bug 1223848</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223919</URL>
      <Description>SUSE Bug 1223919</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223942</URL>
      <Description>SUSE Bug 1223942</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224518</URL>
      <Description>SUSE Bug 1224518</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224526</URL>
      <Description>SUSE Bug 1224526</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1224574</URL>
      <Description>SUSE Bug 1224574</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225725</URL>
      <Description>SUSE Bug 1225725</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225730</URL>
      <Description>SUSE Bug 1225730</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225742</URL>
      <Description>SUSE Bug 1225742</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225764</URL>
      <Description>SUSE Bug 1225764</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225812</URL>
      <Description>SUSE Bug 1225812</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226560</URL>
      <Description>SUSE Bug 1226560</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226592</URL>
      <Description>SUSE Bug 1226592</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226631</URL>
      <Description>SUSE Bug 1226631</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226748</URL>
      <Description>SUSE Bug 1226748</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226872</URL>
      <Description>SUSE Bug 1226872</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227853</URL>
      <Description>SUSE Bug 1227853</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228410</URL>
      <Description>SUSE Bug 1228410</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228430</URL>
      <Description>SUSE Bug 1228430</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228486</URL>
      <Description>SUSE Bug 1228486</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228650</URL>
      <Description>SUSE Bug 1228650</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228857</URL>
      <Description>SUSE Bug 1228857</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229312</URL>
      <Description>SUSE Bug 1229312</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229429</URL>
      <Description>SUSE Bug 1229429</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229585</URL>
      <Description>SUSE Bug 1229585</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229752</URL>
      <Description>SUSE Bug 1229752</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229808</URL>
      <Description>SUSE Bug 1229808</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230055</URL>
      <Description>SUSE Bug 1230055</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230220</URL>
      <Description>SUSE Bug 1230220</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230231</URL>
      <Description>SUSE Bug 1230231</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230270</URL>
      <Description>SUSE Bug 1230270</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230558</URL>
      <Description>SUSE Bug 1230558</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230827</URL>
      <Description>SUSE Bug 1230827</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230918</URL>
      <Description>SUSE Bug 1230918</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231083</URL>
      <Description>SUSE Bug 1231083</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231089</URL>
      <Description>SUSE Bug 1231089</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231098</URL>
      <Description>SUSE Bug 1231098</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231101</URL>
      <Description>SUSE Bug 1231101</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231108</URL>
      <Description>SUSE Bug 1231108</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231111</URL>
      <Description>SUSE Bug 1231111</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231132</URL>
      <Description>SUSE Bug 1231132</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231135</URL>
      <Description>SUSE Bug 1231135</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231138</URL>
      <Description>SUSE Bug 1231138</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231169</URL>
      <Description>SUSE Bug 1231169</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231178</URL>
      <Description>SUSE Bug 1231178</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231180</URL>
      <Description>SUSE Bug 1231180</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231181</URL>
      <Description>SUSE Bug 1231181</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231187</URL>
      <Description>SUSE Bug 1231187</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231202</URL>
      <Description>SUSE Bug 1231202</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231434</URL>
      <Description>SUSE Bug 1231434</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231441</URL>
      <Description>SUSE Bug 1231441</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231452</URL>
      <Description>SUSE Bug 1231452</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231465</URL>
      <Description>SUSE Bug 1231465</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231474</URL>
      <Description>SUSE Bug 1231474</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231481</URL>
      <Description>SUSE Bug 1231481</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231537</URL>
      <Description>SUSE Bug 1231537</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231541</URL>
      <Description>SUSE Bug 1231541</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231646</URL>
      <Description>SUSE Bug 1231646</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231849</URL>
      <Description>SUSE Bug 1231849</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231856</URL>
      <Description>SUSE Bug 1231856</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231858</URL>
      <Description>SUSE Bug 1231858</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231859</URL>
      <Description>SUSE Bug 1231859</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231864</URL>
      <Description>SUSE Bug 1231864</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231904</URL>
      <Description>SUSE Bug 1231904</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231916</URL>
      <Description>SUSE Bug 1231916</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231920</URL>
      <Description>SUSE Bug 1231920</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231923</URL>
      <Description>SUSE Bug 1231923</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231930</URL>
      <Description>SUSE Bug 1231930</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231931</URL>
      <Description>SUSE Bug 1231931</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231947</URL>
      <Description>SUSE Bug 1231947</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231952</URL>
      <Description>SUSE Bug 1231952</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231953</URL>
      <Description>SUSE Bug 1231953</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231959</URL>
      <Description>SUSE Bug 1231959</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231978</URL>
      <Description>SUSE Bug 1231978</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232013</URL>
      <Description>SUSE Bug 1232013</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232015</URL>
      <Description>SUSE Bug 1232015</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232016</URL>
      <Description>SUSE Bug 1232016</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232017</URL>
      <Description>SUSE Bug 1232017</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232027</URL>
      <Description>SUSE Bug 1232027</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232028</URL>
      <Description>SUSE Bug 1232028</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232047</URL>
      <Description>SUSE Bug 1232047</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232048</URL>
      <Description>SUSE Bug 1232048</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232050</URL>
      <Description>SUSE Bug 1232050</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232056</URL>
      <Description>SUSE Bug 1232056</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232076</URL>
      <Description>SUSE Bug 1232076</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232080</URL>
      <Description>SUSE Bug 1232080</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232094</URL>
      <Description>SUSE Bug 1232094</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232096</URL>
      <Description>SUSE Bug 1232096</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232098</URL>
      <Description>SUSE Bug 1232098</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232111</URL>
      <Description>SUSE Bug 1232111</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232126</URL>
      <Description>SUSE Bug 1232126</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232134</URL>
      <Description>SUSE Bug 1232134</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232135</URL>
      <Description>SUSE Bug 1232135</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232141</URL>
      <Description>SUSE Bug 1232141</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232142</URL>
      <Description>SUSE Bug 1232142</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232147</URL>
      <Description>SUSE Bug 1232147</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232152</URL>
      <Description>SUSE Bug 1232152</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232159</URL>
      <Description>SUSE Bug 1232159</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232162</URL>
      <Description>SUSE Bug 1232162</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232165</URL>
      <Description>SUSE Bug 1232165</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232180</URL>
      <Description>SUSE Bug 1232180</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232185</URL>
      <Description>SUSE Bug 1232185</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232187</URL>
      <Description>SUSE Bug 1232187</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232189</URL>
      <Description>SUSE Bug 1232189</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232195</URL>
      <Description>SUSE Bug 1232195</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232198</URL>
      <Description>SUSE Bug 1232198</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232201</URL>
      <Description>SUSE Bug 1232201</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232218</URL>
      <Description>SUSE Bug 1232218</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232224</URL>
      <Description>SUSE Bug 1232224</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232232</URL>
      <Description>SUSE Bug 1232232</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232254</URL>
      <Description>SUSE Bug 1232254</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232255</URL>
      <Description>SUSE Bug 1232255</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232264</URL>
      <Description>SUSE Bug 1232264</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232272</URL>
      <Description>SUSE Bug 1232272</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232279</URL>
      <Description>SUSE Bug 1232279</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232287</URL>
      <Description>SUSE Bug 1232287</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232293</URL>
      <Description>SUSE Bug 1232293</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232312</URL>
      <Description>SUSE Bug 1232312</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232317</URL>
      <Description>SUSE Bug 1232317</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232318</URL>
      <Description>SUSE Bug 1232318</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232333</URL>
      <Description>SUSE Bug 1232333</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232334</URL>
      <Description>SUSE Bug 1232334</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232335</URL>
      <Description>SUSE Bug 1232335</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232339</URL>
      <Description>SUSE Bug 1232339</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232349</URL>
      <Description>SUSE Bug 1232349</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232357</URL>
      <Description>SUSE Bug 1232357</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232359</URL>
      <Description>SUSE Bug 1232359</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232362</URL>
      <Description>SUSE Bug 1232362</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232364</URL>
      <Description>SUSE Bug 1232364</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232370</URL>
      <Description>SUSE Bug 1232370</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232371</URL>
      <Description>SUSE Bug 1232371</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232378</URL>
      <Description>SUSE Bug 1232378</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232385</URL>
      <Description>SUSE Bug 1232385</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232387</URL>
      <Description>SUSE Bug 1232387</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232394</URL>
      <Description>SUSE Bug 1232394</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232413</URL>
      <Description>SUSE Bug 1232413</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232416</URL>
      <Description>SUSE Bug 1232416</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232436</URL>
      <Description>SUSE Bug 1232436</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232483</URL>
      <Description>SUSE Bug 1232483</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232500</URL>
      <Description>SUSE Bug 1232500</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232503</URL>
      <Description>SUSE Bug 1232503</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232504</URL>
      <Description>SUSE Bug 1232504</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232507</URL>
      <Description>SUSE Bug 1232507</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232520</URL>
      <Description>SUSE Bug 1232520</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232552</URL>
      <Description>SUSE Bug 1232552</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232757</URL>
      <Description>SUSE Bug 1232757</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232819</URL>
      <Description>SUSE Bug 1232819</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232860</URL>
      <Description>SUSE Bug 1232860</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232870</URL>
      <Description>SUSE Bug 1232870</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232873</URL>
      <Description>SUSE Bug 1232873</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232877</URL>
      <Description>SUSE Bug 1232877</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232878</URL>
      <Description>SUSE Bug 1232878</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232881</URL>
      <Description>SUSE Bug 1232881</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232884</URL>
      <Description>SUSE Bug 1232884</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232885</URL>
      <Description>SUSE Bug 1232885</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232887</URL>
      <Description>SUSE Bug 1232887</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232888</URL>
      <Description>SUSE Bug 1232888</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232890</URL>
      <Description>SUSE Bug 1232890</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232892</URL>
      <Description>SUSE Bug 1232892</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232896</URL>
      <Description>SUSE Bug 1232896</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232897</URL>
      <Description>SUSE Bug 1232897</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232905</URL>
      <Description>SUSE Bug 1232905</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232907</URL>
      <Description>SUSE Bug 1232907</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232919</URL>
      <Description>SUSE Bug 1232919</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232926</URL>
      <Description>SUSE Bug 1232926</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232928</URL>
      <Description>SUSE Bug 1232928</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232935</URL>
      <Description>SUSE Bug 1232935</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233035</URL>
      <Description>SUSE Bug 1233035</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233049</URL>
      <Description>SUSE Bug 1233049</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233051</URL>
      <Description>SUSE Bug 1233051</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233056</URL>
      <Description>SUSE Bug 1233056</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233057</URL>
      <Description>SUSE Bug 1233057</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233061</URL>
      <Description>SUSE Bug 1233061</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233063</URL>
      <Description>SUSE Bug 1233063</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233065</URL>
      <Description>SUSE Bug 1233065</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233067</URL>
      <Description>SUSE Bug 1233067</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233070</URL>
      <Description>SUSE Bug 1233070</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233073</URL>
      <Description>SUSE Bug 1233073</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233074</URL>
      <Description>SUSE Bug 1233074</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233100</URL>
      <Description>SUSE Bug 1233100</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233103</URL>
      <Description>SUSE Bug 1233103</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233104</URL>
      <Description>SUSE Bug 1233104</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233105</URL>
      <Description>SUSE Bug 1233105</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233106</URL>
      <Description>SUSE Bug 1233106</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233107</URL>
      <Description>SUSE Bug 1233107</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233108</URL>
      <Description>SUSE Bug 1233108</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233110</URL>
      <Description>SUSE Bug 1233110</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233111</URL>
      <Description>SUSE Bug 1233111</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233113</URL>
      <Description>SUSE Bug 1233113</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233114</URL>
      <Description>SUSE Bug 1233114</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233117</URL>
      <Description>SUSE Bug 1233117</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233123</URL>
      <Description>SUSE Bug 1233123</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233125</URL>
      <Description>SUSE Bug 1233125</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233129</URL>
      <Description>SUSE Bug 1233129</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233130</URL>
      <Description>SUSE Bug 1233130</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233134</URL>
      <Description>SUSE Bug 1233134</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233135</URL>
      <Description>SUSE Bug 1233135</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233150</URL>
      <Description>SUSE Bug 1233150</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233189</URL>
      <Description>SUSE Bug 1233189</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233191</URL>
      <Description>SUSE Bug 1233191</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233197</URL>
      <Description>SUSE Bug 1233197</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233205</URL>
      <Description>SUSE Bug 1233205</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233206</URL>
      <Description>SUSE Bug 1233206</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233209</URL>
      <Description>SUSE Bug 1233209</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233210</URL>
      <Description>SUSE Bug 1233210</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233211</URL>
      <Description>SUSE Bug 1233211</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233212</URL>
      <Description>SUSE Bug 1233212</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233214</URL>
      <Description>SUSE Bug 1233214</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233216</URL>
      <Description>SUSE Bug 1233216</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233238</URL>
      <Description>SUSE Bug 1233238</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233241</URL>
      <Description>SUSE Bug 1233241</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233253</URL>
      <Description>SUSE Bug 1233253</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233255</URL>
      <Description>SUSE Bug 1233255</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233293</URL>
      <Description>SUSE Bug 1233293</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233350</URL>
      <Description>SUSE Bug 1233350</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233452</URL>
      <Description>SUSE Bug 1233452</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233453</URL>
      <Description>SUSE Bug 1233453</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233454</URL>
      <Description>SUSE Bug 1233454</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233456</URL>
      <Description>SUSE Bug 1233456</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233457</URL>
      <Description>SUSE Bug 1233457</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233458</URL>
      <Description>SUSE Bug 1233458</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233460</URL>
      <Description>SUSE Bug 1233460</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233462</URL>
      <Description>SUSE Bug 1233462</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233463</URL>
      <Description>SUSE Bug 1233463</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233468</URL>
      <Description>SUSE Bug 1233468</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233471</URL>
      <Description>SUSE Bug 1233471</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233476</URL>
      <Description>SUSE Bug 1233476</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233478</URL>
      <Description>SUSE Bug 1233478</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233479</URL>
      <Description>SUSE Bug 1233479</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233481</URL>
      <Description>SUSE Bug 1233481</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233484</URL>
      <Description>SUSE Bug 1233484</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233487</URL>
      <Description>SUSE Bug 1233487</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233490</URL>
      <Description>SUSE Bug 1233490</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233491</URL>
      <Description>SUSE Bug 1233491</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233528</URL>
      <Description>SUSE Bug 1233528</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233548</URL>
      <Description>SUSE Bug 1233548</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233552</URL>
      <Description>SUSE Bug 1233552</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233553</URL>
      <Description>SUSE Bug 1233553</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233554</URL>
      <Description>SUSE Bug 1233554</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233555</URL>
      <Description>SUSE Bug 1233555</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233557</URL>
      <Description>SUSE Bug 1233557</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233560</URL>
      <Description>SUSE Bug 1233560</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233561</URL>
      <Description>SUSE Bug 1233561</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233570</URL>
      <Description>SUSE Bug 1233570</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233577</URL>
      <Description>SUSE Bug 1233577</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233580</URL>
      <Description>SUSE Bug 1233580</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233977</URL>
      <Description>SUSE Bug 1233977</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234012</URL>
      <Description>SUSE Bug 1234012</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234025</URL>
      <Description>SUSE Bug 1234025</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234085</URL>
      <Description>SUSE Bug 1234085</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234093</URL>
      <Description>SUSE Bug 1234093</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234098</URL>
      <Description>SUSE Bug 1234098</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234108</URL>
      <Description>SUSE Bug 1234108</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-47594/</URL>
      <Description>SUSE CVE CVE-2021-47594 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48674/</URL>
      <Description>SUSE CVE CVE-2022-48674 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48979/</URL>
      <Description>SUSE CVE CVE-2022-48979 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48982/</URL>
      <Description>SUSE CVE CVE-2022-48982 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48983/</URL>
      <Description>SUSE CVE CVE-2022-48983 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48989/</URL>
      <Description>SUSE CVE CVE-2022-48989 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-48990/</URL>
      <Description>SUSE CVE CVE-2022-48990 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52915/</URL>
      <Description>SUSE CVE CVE-2023-52915 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52917/</URL>
      <Description>SUSE CVE CVE-2023-52917 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52918/</URL>
      <Description>SUSE CVE CVE-2023-52918 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52921/</URL>
      <Description>SUSE CVE CVE-2023-52921 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52922/</URL>
      <Description>SUSE CVE CVE-2023-52922 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26782/</URL>
      <Description>SUSE CVE CVE-2024-26782 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26906/</URL>
      <Description>SUSE CVE CVE-2024-26906 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-26953/</URL>
      <Description>SUSE CVE CVE-2024-26953 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35888/</URL>
      <Description>SUSE CVE CVE-2024-35888 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35937/</URL>
      <Description>SUSE CVE CVE-2024-35937 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-35980/</URL>
      <Description>SUSE CVE CVE-2024-35980 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36484/</URL>
      <Description>SUSE CVE CVE-2024-36484 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36883/</URL>
      <Description>SUSE CVE CVE-2024-36883 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36886/</URL>
      <Description>SUSE CVE CVE-2024-36886 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36905/</URL>
      <Description>SUSE CVE CVE-2024-36905 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36953/</URL>
      <Description>SUSE CVE CVE-2024-36953 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36954/</URL>
      <Description>SUSE CVE CVE-2024-36954 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38577/</URL>
      <Description>SUSE CVE CVE-2024-38577 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38589/</URL>
      <Description>SUSE CVE CVE-2024-38589 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38615/</URL>
      <Description>SUSE CVE CVE-2024-38615 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-40997/</URL>
      <Description>SUSE CVE CVE-2024-40997 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-41016/</URL>
      <Description>SUSE CVE CVE-2024-41016 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-41023/</URL>
      <Description>SUSE CVE CVE-2024-41023 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-41049/</URL>
      <Description>SUSE CVE CVE-2024-41049 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-42131/</URL>
      <Description>SUSE CVE CVE-2024-42131 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-43817/</URL>
      <Description>SUSE CVE CVE-2024-43817 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-43897/</URL>
      <Description>SUSE CVE CVE-2024-43897 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-44932/</URL>
      <Description>SUSE CVE CVE-2024-44932 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-44964/</URL>
      <Description>SUSE CVE CVE-2024-44964 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-44995/</URL>
      <Description>SUSE CVE CVE-2024-44995 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46681/</URL>
      <Description>SUSE CVE CVE-2024-46681 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46800/</URL>
      <Description>SUSE CVE CVE-2024-46800 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46802/</URL>
      <Description>SUSE CVE CVE-2024-46802 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46804/</URL>
      <Description>SUSE CVE CVE-2024-46804 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46805/</URL>
      <Description>SUSE CVE CVE-2024-46805 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46807/</URL>
      <Description>SUSE CVE CVE-2024-46807 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46810/</URL>
      <Description>SUSE CVE CVE-2024-46810 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46812/</URL>
      <Description>SUSE CVE CVE-2024-46812 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46819/</URL>
      <Description>SUSE CVE CVE-2024-46819 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46821/</URL>
      <Description>SUSE CVE CVE-2024-46821 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46835/</URL>
      <Description>SUSE CVE CVE-2024-46835 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46842/</URL>
      <Description>SUSE CVE CVE-2024-46842 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46853/</URL>
      <Description>SUSE CVE CVE-2024-46853 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46859/</URL>
      <Description>SUSE CVE CVE-2024-46859 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46864/</URL>
      <Description>SUSE CVE CVE-2024-46864 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-46871/</URL>
      <Description>SUSE CVE CVE-2024-46871 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47663/</URL>
      <Description>SUSE CVE CVE-2024-47663 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47665/</URL>
      <Description>SUSE CVE CVE-2024-47665 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47667/</URL>
      <Description>SUSE CVE CVE-2024-47667 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47669/</URL>
      <Description>SUSE CVE CVE-2024-47669 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47670/</URL>
      <Description>SUSE CVE CVE-2024-47670 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47671/</URL>
      <Description>SUSE CVE CVE-2024-47671 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47679/</URL>
      <Description>SUSE CVE CVE-2024-47679 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47682/</URL>
      <Description>SUSE CVE CVE-2024-47682 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47693/</URL>
      <Description>SUSE CVE CVE-2024-47693 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47695/</URL>
      <Description>SUSE CVE CVE-2024-47695 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47696/</URL>
      <Description>SUSE CVE CVE-2024-47696 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47697/</URL>
      <Description>SUSE CVE CVE-2024-47697 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47698/</URL>
      <Description>SUSE CVE CVE-2024-47698 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47699/</URL>
      <Description>SUSE CVE CVE-2024-47699 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47701/</URL>
      <Description>SUSE CVE CVE-2024-47701 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47709/</URL>
      <Description>SUSE CVE CVE-2024-47709 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47712/</URL>
      <Description>SUSE CVE CVE-2024-47712 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47713/</URL>
      <Description>SUSE CVE CVE-2024-47713 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47718/</URL>
      <Description>SUSE CVE CVE-2024-47718 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47723/</URL>
      <Description>SUSE CVE CVE-2024-47723 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47728/</URL>
      <Description>SUSE CVE CVE-2024-47728 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47735/</URL>
      <Description>SUSE CVE CVE-2024-47735 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47737/</URL>
      <Description>SUSE CVE CVE-2024-47737 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47742/</URL>
      <Description>SUSE CVE CVE-2024-47742 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47745/</URL>
      <Description>SUSE CVE CVE-2024-47745 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47749/</URL>
      <Description>SUSE CVE CVE-2024-47749 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47756/</URL>
      <Description>SUSE CVE CVE-2024-47756 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47757/</URL>
      <Description>SUSE CVE CVE-2024-47757 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49850/</URL>
      <Description>SUSE CVE CVE-2024-49850 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49851/</URL>
      <Description>SUSE CVE CVE-2024-49851 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49852/</URL>
      <Description>SUSE CVE CVE-2024-49852 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49855/</URL>
      <Description>SUSE CVE CVE-2024-49855 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49861/</URL>
      <Description>SUSE CVE CVE-2024-49861 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49863/</URL>
      <Description>SUSE CVE CVE-2024-49863 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49868/</URL>
      <Description>SUSE CVE CVE-2024-49868 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49870/</URL>
      <Description>SUSE CVE CVE-2024-49870 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49871/</URL>
      <Description>SUSE CVE CVE-2024-49871 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49875/</URL>
      <Description>SUSE CVE CVE-2024-49875 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49877/</URL>
      <Description>SUSE CVE CVE-2024-49877 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49879/</URL>
      <Description>SUSE CVE CVE-2024-49879 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49884/</URL>
      <Description>SUSE CVE CVE-2024-49884 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49891/</URL>
      <Description>SUSE CVE CVE-2024-49891 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49900/</URL>
      <Description>SUSE CVE CVE-2024-49900 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49902/</URL>
      <Description>SUSE CVE CVE-2024-49902 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49903/</URL>
      <Description>SUSE CVE CVE-2024-49903 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49905/</URL>
      <Description>SUSE CVE CVE-2024-49905 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49907/</URL>
      <Description>SUSE CVE CVE-2024-49907 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49908/</URL>
      <Description>SUSE CVE CVE-2024-49908 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49921/</URL>
      <Description>SUSE CVE CVE-2024-49921 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49924/</URL>
      <Description>SUSE CVE CVE-2024-49924 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49925/</URL>
      <Description>SUSE CVE CVE-2024-49925 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49934/</URL>
      <Description>SUSE CVE CVE-2024-49934 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49935/</URL>
      <Description>SUSE CVE CVE-2024-49935 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49938/</URL>
      <Description>SUSE CVE CVE-2024-49938 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49945/</URL>
      <Description>SUSE CVE CVE-2024-49945 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49947/</URL>
      <Description>SUSE CVE CVE-2024-49947 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49950/</URL>
      <Description>SUSE CVE CVE-2024-49950 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49957/</URL>
      <Description>SUSE CVE CVE-2024-49957 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49963/</URL>
      <Description>SUSE CVE CVE-2024-49963 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49965/</URL>
      <Description>SUSE CVE CVE-2024-49965 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49966/</URL>
      <Description>SUSE CVE CVE-2024-49966 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49968/</URL>
      <Description>SUSE CVE CVE-2024-49968 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49981/</URL>
      <Description>SUSE CVE CVE-2024-49981 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49983/</URL>
      <Description>SUSE CVE CVE-2024-49983 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49985/</URL>
      <Description>SUSE CVE CVE-2024-49985 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-49989/</URL>
      <Description>SUSE CVE CVE-2024-49989 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50003/</URL>
      <Description>SUSE CVE CVE-2024-50003 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50007/</URL>
      <Description>SUSE CVE CVE-2024-50007 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50008/</URL>
      <Description>SUSE CVE CVE-2024-50008 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50009/</URL>
      <Description>SUSE CVE CVE-2024-50009 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50013/</URL>
      <Description>SUSE CVE CVE-2024-50013 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50017/</URL>
      <Description>SUSE CVE CVE-2024-50017 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50025/</URL>
      <Description>SUSE CVE CVE-2024-50025 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50026/</URL>
      <Description>SUSE CVE CVE-2024-50026 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50031/</URL>
      <Description>SUSE CVE CVE-2024-50031 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50044/</URL>
      <Description>SUSE CVE CVE-2024-50044 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50062/</URL>
      <Description>SUSE CVE CVE-2024-50062 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50067/</URL>
      <Description>SUSE CVE CVE-2024-50067 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50073/</URL>
      <Description>SUSE CVE CVE-2024-50073 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50074/</URL>
      <Description>SUSE CVE CVE-2024-50074 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50077/</URL>
      <Description>SUSE CVE CVE-2024-50077 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50078/</URL>
      <Description>SUSE CVE CVE-2024-50078 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50082/</URL>
      <Description>SUSE CVE CVE-2024-50082 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50089/</URL>
      <Description>SUSE CVE CVE-2024-50089 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50093/</URL>
      <Description>SUSE CVE CVE-2024-50093 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50095/</URL>
      <Description>SUSE CVE CVE-2024-50095 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50096/</URL>
      <Description>SUSE CVE CVE-2024-50096 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50098/</URL>
      <Description>SUSE CVE CVE-2024-50098 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50099/</URL>
      <Description>SUSE CVE CVE-2024-50099 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50103/</URL>
      <Description>SUSE CVE CVE-2024-50103 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50108/</URL>
      <Description>SUSE CVE CVE-2024-50108 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50110/</URL>
      <Description>SUSE CVE CVE-2024-50110 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50115/</URL>
      <Description>SUSE CVE CVE-2024-50115 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50116/</URL>
      <Description>SUSE CVE CVE-2024-50116 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50117/</URL>
      <Description>SUSE CVE CVE-2024-50117 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50124/</URL>
      <Description>SUSE CVE CVE-2024-50124 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50125/</URL>
      <Description>SUSE CVE CVE-2024-50125 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50127/</URL>
      <Description>SUSE CVE CVE-2024-50127 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50128/</URL>
      <Description>SUSE CVE CVE-2024-50128 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50131/</URL>
      <Description>SUSE CVE CVE-2024-50131 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50134/</URL>
      <Description>SUSE CVE CVE-2024-50134 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50135/</URL>
      <Description>SUSE CVE CVE-2024-50135 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50138/</URL>
      <Description>SUSE CVE CVE-2024-50138 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50141/</URL>
      <Description>SUSE CVE CVE-2024-50141 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50146/</URL>
      <Description>SUSE CVE CVE-2024-50146 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50147/</URL>
      <Description>SUSE CVE CVE-2024-50147 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50148/</URL>
      <Description>SUSE CVE CVE-2024-50148 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50150/</URL>
      <Description>SUSE CVE CVE-2024-50150 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50153/</URL>
      <Description>SUSE CVE CVE-2024-50153 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50154/</URL>
      <Description>SUSE CVE CVE-2024-50154 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50155/</URL>
      <Description>SUSE CVE CVE-2024-50155 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50156/</URL>
      <Description>SUSE CVE CVE-2024-50156 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50160/</URL>
      <Description>SUSE CVE CVE-2024-50160 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50167/</URL>
      <Description>SUSE CVE CVE-2024-50167 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50171/</URL>
      <Description>SUSE CVE CVE-2024-50171 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50179/</URL>
      <Description>SUSE CVE CVE-2024-50179 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50180/</URL>
      <Description>SUSE CVE CVE-2024-50180 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50182/</URL>
      <Description>SUSE CVE CVE-2024-50182 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50183/</URL>
      <Description>SUSE CVE CVE-2024-50183 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50184/</URL>
      <Description>SUSE CVE CVE-2024-50184 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50186/</URL>
      <Description>SUSE CVE CVE-2024-50186 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50187/</URL>
      <Description>SUSE CVE CVE-2024-50187 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50188/</URL>
      <Description>SUSE CVE CVE-2024-50188 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50189/</URL>
      <Description>SUSE CVE CVE-2024-50189 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50192/</URL>
      <Description>SUSE CVE CVE-2024-50192 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50194/</URL>
      <Description>SUSE CVE CVE-2024-50194 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50195/</URL>
      <Description>SUSE CVE CVE-2024-50195 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50196/</URL>
      <Description>SUSE CVE CVE-2024-50196 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50198/</URL>
      <Description>SUSE CVE CVE-2024-50198 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50201/</URL>
      <Description>SUSE CVE CVE-2024-50201 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50205/</URL>
      <Description>SUSE CVE CVE-2024-50205 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50208/</URL>
      <Description>SUSE CVE CVE-2024-50208 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50209/</URL>
      <Description>SUSE CVE CVE-2024-50209 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50215/</URL>
      <Description>SUSE CVE CVE-2024-50215 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50218/</URL>
      <Description>SUSE CVE CVE-2024-50218 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50229/</URL>
      <Description>SUSE CVE CVE-2024-50229 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50230/</URL>
      <Description>SUSE CVE CVE-2024-50230 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50232/</URL>
      <Description>SUSE CVE CVE-2024-50232 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50233/</URL>
      <Description>SUSE CVE CVE-2024-50233 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50234/</URL>
      <Description>SUSE CVE CVE-2024-50234 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50236/</URL>
      <Description>SUSE CVE CVE-2024-50236 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50237/</URL>
      <Description>SUSE CVE CVE-2024-50237 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50249/</URL>
      <Description>SUSE CVE CVE-2024-50249 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50255/</URL>
      <Description>SUSE CVE CVE-2024-50255 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50259/</URL>
      <Description>SUSE CVE CVE-2024-50259 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50261/</URL>
      <Description>SUSE CVE CVE-2024-50261 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50264/</URL>
      <Description>SUSE CVE CVE-2024-50264 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50265/</URL>
      <Description>SUSE CVE CVE-2024-50265 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50267/</URL>
      <Description>SUSE CVE CVE-2024-50267 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50268/</URL>
      <Description>SUSE CVE CVE-2024-50268 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50269/</URL>
      <Description>SUSE CVE CVE-2024-50269 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50271/</URL>
      <Description>SUSE CVE CVE-2024-50271 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50273/</URL>
      <Description>SUSE CVE CVE-2024-50273 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50274/</URL>
      <Description>SUSE CVE CVE-2024-50274 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50279/</URL>
      <Description>SUSE CVE CVE-2024-50279 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50282/</URL>
      <Description>SUSE CVE CVE-2024-50282 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50287/</URL>
      <Description>SUSE CVE CVE-2024-50287 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50289/</URL>
      <Description>SUSE CVE CVE-2024-50289 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50290/</URL>
      <Description>SUSE CVE CVE-2024-50290 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50292/</URL>
      <Description>SUSE CVE CVE-2024-50292 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50295/</URL>
      <Description>SUSE CVE CVE-2024-50295 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50298/</URL>
      <Description>SUSE CVE CVE-2024-50298 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50301/</URL>
      <Description>SUSE CVE CVE-2024-50301 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50302/</URL>
      <Description>SUSE CVE CVE-2024-50302 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53052/</URL>
      <Description>SUSE CVE CVE-2024-53052 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53058/</URL>
      <Description>SUSE CVE CVE-2024-53058 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53059/</URL>
      <Description>SUSE CVE CVE-2024-53059 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53060/</URL>
      <Description>SUSE CVE CVE-2024-53060 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53061/</URL>
      <Description>SUSE CVE CVE-2024-53061 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53063/</URL>
      <Description>SUSE CVE CVE-2024-53063 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53066/</URL>
      <Description>SUSE CVE CVE-2024-53066 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53068/</URL>
      <Description>SUSE CVE CVE-2024-53068 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53079/</URL>
      <Description>SUSE CVE CVE-2024-53079 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53085/</URL>
      <Description>SUSE CVE CVE-2024-53085 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53088/</URL>
      <Description>SUSE CVE CVE-2024-53088 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53104/</URL>
      <Description>SUSE CVE CVE-2024-53104 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-53110/</URL>
      <Description>SUSE CVE CVE-2024-53110 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Image SLES15-SP5-Azure-3P">
      <Branch Type="Product Name" Name="Image SLES15-SP5-Azure-3P">
        <FullProductName ProductID="Image SLES15-SP5-Azure-3P">Image SLES15-SP5-Azure-3P</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP5-Azure-Basic">
      <Branch Type="Product Name" Name="Image SLES15-SP5-Azure-Basic">
        <FullProductName ProductID="Image SLES15-SP5-Azure-Basic">Image SLES15-SP5-Azure-Basic</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP5-Azure-Standard">
      <Branch Type="Product Name" Name="Image SLES15-SP5-Azure-Standard">
        <FullProductName ProductID="Image SLES15-SP5-Azure-Standard">Image SLES15-SP5-Azure-Standard</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP5-HPC-Azure">
      <Branch Type="Product Name" Name="Image SLES15-SP5-HPC-Azure">
        <FullProductName ProductID="Image SLES15-SP5-HPC-Azure">Image SLES15-SP5-HPC-Azure</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Public Cloud 15 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Public Cloud 15 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Public Cloud 15 SP5" CPE="cpe:/o:suse:sle-module-public-cloud:15:sp5">SUSE Linux Enterprise Module for Public Cloud 15 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.5">
      <Branch Type="Product Name" Name="openSUSE Leap 15.5">
        <FullProductName ProductID="openSUSE Leap 15.5" CPE="cpe:/o:opensuse:leap:15.5">openSUSE Leap 15.5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-azure-5.14.21-150500.33.75.1">
      <FullProductName ProductID="kernel-azure-5.14.21-150500.33.75.1">kernel-azure-5.14.21-150500.33.75.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cluster-md-kmp-azure-5.14.21-150500.33.75.1">
      <FullProductName ProductID="cluster-md-kmp-azure-5.14.21-150500.33.75.1">cluster-md-kmp-azure-5.14.21-150500.33.75.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dlm-kmp-azure-5.14.21-150500.33.75.1">
      <FullProductName ProductID="dlm-kmp-azure-5.14.21-150500.33.75.1">dlm-kmp-azure-5.14.21-150500.33.75.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gfs2-kmp-azure-5.14.21-150500.33.75.1">
      <FullProductName ProductID="gfs2-kmp-azure-5.14.21-150500.33.75.1">gfs2-kmp-azure-5.14.21-150500.33.75.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-azure-devel-5.14.21-150500.33.75.1">
      <FullProductName ProductID="kernel-azure-devel-5.14.21-150500.33.75.1">kernel-azure-devel-5.14.21-150500.33.75.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-azure-extra-5.14.21-150500.33.75.1">
      <FullProductName ProductID="kernel-azure-extra-5.14.21-150500.33.75.1">kernel-azure-extra-5.14.21-150500.33.75.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-azure-optional-5.14.21-150500.33.75.1">
      <FullProductName ProductID="kernel-azure-optional-5.14.21-150500.33.75.1">kernel-azure-optional-5.14.21-150500.33.75.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-azure-vdso-5.14.21-150500.33.75.1">
      <FullProductName ProductID="kernel-azure-vdso-5.14.21-150500.33.75.1">kernel-azure-vdso-5.14.21-150500.33.75.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-azure-5.14.21-150500.33.75.1">
      <FullProductName ProductID="kernel-devel-azure-5.14.21-150500.33.75.1">kernel-devel-azure-5.14.21-150500.33.75.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-azure-5.14.21-150500.33.75.1">
      <FullProductName ProductID="kernel-source-azure-5.14.21-150500.33.75.1">kernel-source-azure-5.14.21-150500.33.75.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-azure-5.14.21-150500.33.75.1">
      <FullProductName ProductID="kernel-syms-azure-5.14.21-150500.33.75.1">kernel-syms-azure-5.14.21-150500.33.75.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kselftests-kmp-azure-5.14.21-150500.33.75.1">
      <FullProductName ProductID="kselftests-kmp-azure-5.14.21-150500.33.75.1">kselftests-kmp-azure-5.14.21-150500.33.75.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ocfs2-kmp-azure-5.14.21-150500.33.75.1">
      <FullProductName ProductID="ocfs2-kmp-azure-5.14.21-150500.33.75.1">ocfs2-kmp-azure-5.14.21-150500.33.75.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="reiserfs-kmp-azure-5.14.21-150500.33.75.1">
      <FullProductName ProductID="reiserfs-kmp-azure-5.14.21-150500.33.75.1">reiserfs-kmp-azure-5.14.21-150500.33.75.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-azure-5.14.21-150500.33.75.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP5-Azure-3P">
      <FullProductName ProductID="Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1">kernel-azure-5.14.21-150500.33.75.1 as a component of Image SLES15-SP5-Azure-3P</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-5.14.21-150500.33.75.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP5-Azure-Basic">
      <FullProductName ProductID="Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1">kernel-azure-5.14.21-150500.33.75.1 as a component of Image SLES15-SP5-Azure-Basic</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-5.14.21-150500.33.75.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP5-Azure-Standard">
      <FullProductName ProductID="Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1">kernel-azure-5.14.21-150500.33.75.1 as a component of Image SLES15-SP5-Azure-Standard</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-5.14.21-150500.33.75.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP5-HPC-Azure">
      <FullProductName ProductID="Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1">kernel-azure-5.14.21-150500.33.75.1 as a component of Image SLES15-SP5-HPC-Azure</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-5.14.21-150500.33.75.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Public Cloud 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1">kernel-azure-5.14.21-150500.33.75.1 as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-devel-5.14.21-150500.33.75.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Public Cloud 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1">kernel-azure-devel-5.14.21-150500.33.75.1 as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-azure-5.14.21-150500.33.75.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Public Cloud 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1">kernel-devel-azure-5.14.21-150500.33.75.1 as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-azure-5.14.21-150500.33.75.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Public Cloud 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1">kernel-source-azure-5.14.21-150500.33.75.1 as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-azure-5.14.21-150500.33.75.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Public Cloud 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1">kernel-syms-azure-5.14.21-150500.33.75.1 as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-azure-5.14.21-150500.33.75.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1">cluster-md-kmp-azure-5.14.21-150500.33.75.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-azure-5.14.21-150500.33.75.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1">dlm-kmp-azure-5.14.21-150500.33.75.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-azure-5.14.21-150500.33.75.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1">gfs2-kmp-azure-5.14.21-150500.33.75.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-5.14.21-150500.33.75.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1">kernel-azure-5.14.21-150500.33.75.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-devel-5.14.21-150500.33.75.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1">kernel-azure-devel-5.14.21-150500.33.75.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-extra-5.14.21-150500.33.75.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1">kernel-azure-extra-5.14.21-150500.33.75.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-optional-5.14.21-150500.33.75.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1">kernel-azure-optional-5.14.21-150500.33.75.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-vdso-5.14.21-150500.33.75.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1">kernel-azure-vdso-5.14.21-150500.33.75.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-azure-5.14.21-150500.33.75.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1">kernel-devel-azure-5.14.21-150500.33.75.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-azure-5.14.21-150500.33.75.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1">kernel-source-azure-5.14.21-150500.33.75.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-azure-5.14.21-150500.33.75.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1">kernel-syms-azure-5.14.21-150500.33.75.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kselftests-kmp-azure-5.14.21-150500.33.75.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1">kselftests-kmp-azure-5.14.21-150500.33.75.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-azure-5.14.21-150500.33.75.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1">ocfs2-kmp-azure-5.14.21-150500.33.75.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="reiserfs-kmp-azure-5.14.21-150500.33.75.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1">reiserfs-kmp-azure-5.14.21-150500.33.75.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mptcp: never allow the PM to close a listener subflow

Currently, when deleting an endpoint the netlink PM treverses
all the local MPTCP sockets, regardless of their status.

If an MPTCP listener socket is bound to the IP matching the
delete endpoint, the listener TCP socket will be closed.
That is unexpected, the PM should only affect data subflows.

Additionally, syzbot was able to trigger a NULL ptr dereference
due to the above:

general protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f]
CPU: 1 PID: 6550 Comm: syz-executor122 Not tainted 5.16.0-rc4-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__lock_acquire+0xd7d/0x54a0 kernel/locking/lockdep.c:4897
Code: 0f 0e 41 be 01 00 00 00 0f 86 c8 00 00 00 89 05 69 cc 0f 0e e9 bd 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 c1 ea 03 &lt;80&gt; 3c 02 00 0f 85 f3 2f 00 00 48 81 3b 20 75 17 8f 0f 84 52 f3 ff
RSP: 0018:ffffc90001f2f818 EFLAGS: 00010016
RAX: dffffc0000000000 RBX: 0000000000000018 RCX: 0000000000000000
RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000001
RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000001
R10: 0000000000000000 R11: 000000000000000a R12: 0000000000000000
R13: ffff88801b98d700 R14: 0000000000000000 R15: 0000000000000001
FS:  00007f177cd3d700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f177cd1b268 CR3: 000000001dd55000 CR4: 0000000000350ee0
Call Trace:
 &lt;TASK&gt;
 lock_acquire kernel/locking/lockdep.c:5637 [inline]
 lock_acquire+0x1ab/0x510 kernel/locking/lockdep.c:5602
 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
 _raw_spin_lock_irqsave+0x39/0x50 kernel/locking/spinlock.c:162
 finish_wait+0xc0/0x270 kernel/sched/wait.c:400
 inet_csk_wait_for_connect net/ipv4/inet_connection_sock.c:464 [inline]
 inet_csk_accept+0x7de/0x9d0 net/ipv4/inet_connection_sock.c:497
 mptcp_accept+0xe5/0x500 net/mptcp/protocol.c:2865
 inet_accept+0xe4/0x7b0 net/ipv4/af_inet.c:739
 mptcp_stream_accept+0x2e7/0x10e0 net/mptcp/protocol.c:3345
 do_accept+0x382/0x510 net/socket.c:1773
 __sys_accept4_file+0x7e/0xe0 net/socket.c:1816
 __sys_accept4+0xb0/0x100 net/socket.c:1846
 __do_sys_accept net/socket.c:1864 [inline]
 __se_sys_accept net/socket.c:1861 [inline]
 __x64_sys_accept+0x71/0xb0 net/socket.c:1861
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f177cd8b8e9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 b1 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f177cd3d308 EFLAGS: 00000246 ORIG_RAX: 000000000000002b
RAX: ffffffffffffffda RBX: 00007f177ce13408 RCX: 00007f177cd8b8e9
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003
RBP: 00007f177ce13400 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f177ce1340c
R13: 00007f177cde1004 R14: 6d705f706374706d R15: 0000000000022000
 &lt;/TASK&gt;

Fix the issue explicitly skipping MPTCP socket in TCP_LISTEN
status.</Note>
    </Notes>
    <CVE>CVE-2021-47594</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-47594.html</URL>
        <Description>CVE-2021-47594</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226560</URL>
        <Description>SUSE Bug 1226560</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

erofs: fix pcluster use-after-free on UP platforms

During stress testing with CONFIG_SMP disabled, KASAN reports as below:

==================================================================
BUG: KASAN: use-after-free in __mutex_lock+0xe5/0xc30
Read of size 8 at addr ffff8881094223f8 by task stress/7789

CPU: 0 PID: 7789 Comm: stress Not tainted 6.0.0-rc1-00002-g0d53d2e882f9 #3
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
Call Trace:
 &lt;TASK&gt;
..
 __mutex_lock+0xe5/0xc30
..
 z_erofs_do_read_page+0x8ce/0x1560
..
 z_erofs_readahead+0x31c/0x580
..
Freed by task 7787
 kasan_save_stack+0x1e/0x40
 kasan_set_track+0x20/0x30
 kasan_set_free_info+0x20/0x40
 __kasan_slab_free+0x10c/0x190
 kmem_cache_free+0xed/0x380
 rcu_core+0x3d5/0xc90
 __do_softirq+0x12d/0x389

Last potentially related work creation:
 kasan_save_stack+0x1e/0x40
 __kasan_record_aux_stack+0x97/0xb0
 call_rcu+0x3d/0x3f0
 erofs_shrink_workstation+0x11f/0x210
 erofs_shrink_scan+0xdc/0x170
 shrink_slab.constprop.0+0x296/0x530
 drop_slab+0x1c/0x70
 drop_caches_sysctl_handler+0x70/0x80
 proc_sys_call_handler+0x20a/0x2f0
 vfs_write+0x555/0x6c0
 ksys_write+0xbe/0x160
 do_syscall_64+0x3b/0x90

The root cause is that erofs_workgroup_unfreeze() doesn't reset to
orig_val thus it causes a race that the pcluster reuses unexpectedly
before freeing.

Since UP platforms are quite rare now, such path becomes unnecessary.
Let's drop such specific-designed path directly instead.</Note>
    </Notes>
    <CVE>CVE-2022-48674</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48674.html</URL>
        <Description>CVE-2022-48674</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223942</URL>
        <Description>SUSE Bug 1223942</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: fix array index out of bound error in DCN32 DML

[Why&amp;How]
LinkCapacitySupport array is indexed with the number of voltage states and
not the number of max DPPs. Fix the error by changing the array
declaration to use the correct (larger) array size of total number of
voltage states.</Note>
    </Notes>
    <CVE>CVE-2022-48979</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48979.html</URL>
        <Description>CVE-2022-48979</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232293</URL>
        <Description>SUSE Bug 1232293</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Fix crash when replugging CSR fake controllers

It seems fake CSR 5.0 clones can cause the suspend notifier to be
registered twice causing the following kernel panic:

[   71.986122] Call Trace:
[   71.986124]  &lt;TASK&gt;
[   71.986125]  blocking_notifier_chain_register+0x33/0x60
[   71.986130]  hci_register_dev+0x316/0x3d0 [bluetooth 99b5497ea3d09708fa1366c1dc03288bf3cca8da]
[   71.986154]  btusb_probe+0x979/0xd85 [btusb e1e0605a4f4c01984a4b9c8ac58c3666ae287477]
[   71.986159]  ? __pm_runtime_set_status+0x1a9/0x300
[   71.986162]  ? ktime_get_mono_fast_ns+0x3e/0x90
[   71.986167]  usb_probe_interface+0xe3/0x2b0
[   71.986171]  really_probe+0xdb/0x380
[   71.986174]  ? pm_runtime_barrier+0x54/0x90
[   71.986177]  __driver_probe_device+0x78/0x170
[   71.986180]  driver_probe_device+0x1f/0x90
[   71.986183]  __device_attach_driver+0x89/0x110
[   71.986186]  ? driver_allows_async_probing+0x70/0x70
[   71.986189]  bus_for_each_drv+0x8c/0xe0
[   71.986192]  __device_attach+0xb2/0x1e0
[   71.986195]  bus_probe_device+0x92/0xb0
[   71.986198]  device_add+0x422/0x9a0
[   71.986201]  ? sysfs_merge_group+0xd4/0x110
[   71.986205]  usb_set_configuration+0x57a/0x820
[   71.986208]  usb_generic_driver_probe+0x4f/0x70
[   71.986211]  usb_probe_device+0x3a/0x110
[   71.986213]  really_probe+0xdb/0x380
[   71.986216]  ? pm_runtime_barrier+0x54/0x90
[   71.986219]  __driver_probe_device+0x78/0x170
[   71.986221]  driver_probe_device+0x1f/0x90
[   71.986224]  __device_attach_driver+0x89/0x110
[   71.986227]  ? driver_allows_async_probing+0x70/0x70
[   71.986230]  bus_for_each_drv+0x8c/0xe0
[   71.986232]  __device_attach+0xb2/0x1e0
[   71.986235]  bus_probe_device+0x92/0xb0
[   71.986237]  device_add+0x422/0x9a0
[   71.986239]  ? _dev_info+0x7d/0x98
[   71.986242]  ? blake2s_update+0x4c/0xc0
[   71.986246]  usb_new_device.cold+0x148/0x36d
[   71.986250]  hub_event+0xa8a/0x1910
[   71.986255]  process_one_work+0x1c4/0x380
[   71.986259]  worker_thread+0x51/0x390
[   71.986262]  ? rescuer_thread+0x3b0/0x3b0
[   71.986264]  kthread+0xdb/0x110
[   71.986266]  ? kthread_complete_and_exit+0x20/0x20
[   71.986268]  ret_from_fork+0x1f/0x30
[   71.986273]  &lt;/TASK&gt;
[   71.986274] ---[ end trace 0000000000000000 ]---
[   71.986284] btusb: probe of 2-1.6:1.0 failed with error -17</Note>
    </Notes>
    <CVE>CVE-2022-48982</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48982.html</URL>
        <Description>CVE-2022-48982</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231978</URL>
        <Description>SUSE Bug 1231978</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

io_uring: Fix a null-ptr-deref in io_tctx_exit_cb()

Syzkaller reports a NULL deref bug as follows:

 BUG: KASAN: null-ptr-deref in io_tctx_exit_cb+0x53/0xd3
 Read of size 4 at addr 0000000000000138 by task file1/1955

 CPU: 1 PID: 1955 Comm: file1 Not tainted 6.1.0-rc7-00103-gef4d3ea40565 #75
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-2.el7 04/01/2014
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0xcd/0x134
  ? io_tctx_exit_cb+0x53/0xd3
  kasan_report+0xbb/0x1f0
  ? io_tctx_exit_cb+0x53/0xd3
  kasan_check_range+0x140/0x190
  io_tctx_exit_cb+0x53/0xd3
  task_work_run+0x164/0x250
  ? task_work_cancel+0x30/0x30
  get_signal+0x1c3/0x2440
  ? lock_downgrade+0x6e0/0x6e0
  ? lock_downgrade+0x6e0/0x6e0
  ? exit_signals+0x8b0/0x8b0
  ? do_raw_read_unlock+0x3b/0x70
  ? do_raw_spin_unlock+0x50/0x230
  arch_do_signal_or_restart+0x82/0x2470
  ? kmem_cache_free+0x260/0x4b0
  ? putname+0xfe/0x140
  ? get_sigframe_size+0x10/0x10
  ? do_execveat_common.isra.0+0x226/0x710
  ? lockdep_hardirqs_on+0x79/0x100
  ? putname+0xfe/0x140
  ? do_execveat_common.isra.0+0x238/0x710
  exit_to_user_mode_prepare+0x15f/0x250
  syscall_exit_to_user_mode+0x19/0x50
  do_syscall_64+0x42/0xb0
  entry_SYSCALL_64_after_hwframe+0x63/0xcd
 RIP: 0023:0x0
 Code: Unable to access opcode bytes at 0xffffffffffffffd6.
 RSP: 002b:00000000fffb7790 EFLAGS: 00000200 ORIG_RAX: 000000000000000b
 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
  &lt;/TASK&gt;
 Kernel panic - not syncing: panic_on_warn set ...

This happens because the adding of task_work from io_ring_exit_work()
isn't synchronized with canceling all work items from eg exec. The
execution of the two are ordered in that they are both run by the task
itself, but if io_tctx_exit_cb() is queued while we're canceling all
work items off exec AND gets executed when the task exits to userspace
rather than in the main loop in io_uring_cancel_generic(), then we can
find current-&gt;io_uring == NULL and hit the above crash.

It's safe to add this NULL check here, because the execution of the two
paths are done by the task itself.

[axboe: add code comment and also put an explanation in the commit msg]</Note>
    </Notes>
    <CVE>CVE-2022-48983</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48983.html</URL>
        <Description>CVE-2022-48983</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231959</URL>
        <Description>SUSE Bug 1231959</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

fscache: Fix oops due to race with cookie_lru and use_cookie

If a cookie expires from the LRU and the LRU_DISCARD flag is set, but
the state machine has not run yet, it's possible another thread can call
fscache_use_cookie and begin to use it.

When the cookie_worker finally runs, it will see the LRU_DISCARD flag
set, transition the cookie-&gt;state to LRU_DISCARDING, which will then
withdraw the cookie.  Once the cookie is withdrawn the object is removed
the below oops will occur because the object associated with the cookie
is now NULL.

Fix the oops by clearing the LRU_DISCARD bit if another thread uses the
cookie before the cookie_worker runs.

  BUG: kernel NULL pointer dereference, address: 0000000000000008
  ...
  CPU: 31 PID: 44773 Comm: kworker/u130:1 Tainted: G     E    6.0.0-5.dneg.x86_64 #1
  Hardware name: Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022
  Workqueue: events_unbound netfs_rreq_write_to_cache_work [netfs]
  RIP: 0010:cachefiles_prepare_write+0x28/0x90 [cachefiles]
  ...
  Call Trace:
    netfs_rreq_write_to_cache_work+0x11c/0x320 [netfs]
    process_one_work+0x217/0x3e0
    worker_thread+0x4a/0x3b0
    kthread+0xd6/0x100</Note>
    </Notes>
    <CVE>CVE-2022-48989</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48989.html</URL>
        <Description>CVE-2022-48989</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232027</URL>
        <Description>SUSE Bug 1232027</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix use-after-free during gpu recovery

[Why]
    [  754.862560] refcount_t: underflow; use-after-free.
    [  754.862898] Call Trace:
    [  754.862903]  &lt;TASK&gt;
    [  754.862913]  amdgpu_job_free_cb+0xc2/0xe1 [amdgpu]
    [  754.863543]  drm_sched_main.cold+0x34/0x39 [amd_sched]

[How]
    The fw_fence may be not init, check whether dma_fence_init
    is performed before job free</Note>
    </Notes>
    <CVE>CVE-2022-48990</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-48990.html</URL>
        <Description>CVE-2022-48990</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232028</URL>
        <Description>SUSE Bug 1232028</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232029</URL>
        <Description>SUSE Bug 1232029</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

media: dvb-usb-v2: af9035: Fix null-ptr-deref in af9035_i2c_master_xfer

In af9035_i2c_master_xfer, msg is controlled by user. When msg[i].buf
is null and msg[i].len is zero, former checks on msg[i].buf would be
passed. Malicious data finally reach af9035_i2c_master_xfer. If accessing
msg[i].buf[0] without sanity check, null ptr deref would happen.
We add check on msg[i].len to prevent crash.

Similar commit:
commit 0ed554fd769a
("media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()")</Note>
    </Notes>
    <CVE>CVE-2023-52915</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52915.html</URL>
        <Description>CVE-2023-52915</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230270</URL>
        <Description>SUSE Bug 1230270</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.</Note>
    </Notes>
    <CVE>CVE-2023-52917</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52917.html</URL>
        <Description>CVE-2023-52917</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231849</URL>
        <Description>SUSE Bug 1231849</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

media: pci: cx23885: check cx23885_vdev_init() return

cx23885_vdev_init() can return a NULL pointer, but that pointer
is used in the next line without a check.

Add a NULL pointer check and go to the error unwind if it is NULL.</Note>
    </Notes>
    <CVE>CVE-2023-52918</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52918.html</URL>
        <Description>CVE-2023-52918</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232047</URL>
        <Description>SUSE Bug 1232047</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix possible UAF in amdgpu_cs_pass1()

Since the gang_size check is outside of chunk parsing
loop, we need to reset i before we free the chunk data.

Suggested by Ye Zhang (@VAR10CK) of Baidu Security.</Note>
    </Notes>
    <CVE>CVE-2023-52921</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52921.html</URL>
        <Description>CVE-2023-52921</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233452</URL>
        <Description>SUSE Bug 1233452</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

can: bcm: Fix UAF in bcm_proc_show()

BUG: KASAN: slab-use-after-free in bcm_proc_show+0x969/0xa80
Read of size 8 at addr ffff888155846230 by task cat/7862

CPU: 1 PID: 7862 Comm: cat Not tainted 6.5.0-rc1-00153-gc8746099c197 #230
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0xd5/0x150
 print_report+0xc1/0x5e0
 kasan_report+0xba/0xf0
 bcm_proc_show+0x969/0xa80
 seq_read_iter+0x4f6/0x1260
 seq_read+0x165/0x210
 proc_reg_read+0x227/0x300
 vfs_read+0x1d5/0x8d0
 ksys_read+0x11e/0x240
 do_syscall_64+0x35/0xb0
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

Allocated by task 7846:
 kasan_save_stack+0x1e/0x40
 kasan_set_track+0x21/0x30
 __kasan_kmalloc+0x9e/0xa0
 bcm_sendmsg+0x264b/0x44e0
 sock_sendmsg+0xda/0x180
 ____sys_sendmsg+0x735/0x920
 ___sys_sendmsg+0x11d/0x1b0
 __sys_sendmsg+0xfa/0x1d0
 do_syscall_64+0x35/0xb0
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

Freed by task 7846:
 kasan_save_stack+0x1e/0x40
 kasan_set_track+0x21/0x30
 kasan_save_free_info+0x27/0x40
 ____kasan_slab_free+0x161/0x1c0
 slab_free_freelist_hook+0x119/0x220
 __kmem_cache_free+0xb4/0x2e0
 rcu_core+0x809/0x1bd0

bcm_op is freed before procfs entry be removed in bcm_release(),
this lead to bcm_proc_show() may read the freed bcm_op.</Note>
    </Notes>
    <CVE>CVE-2023-52922</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52922.html</URL>
        <Description>CVE-2023-52922</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233977</URL>
        <Description>SUSE Bug 1233977</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix double-free on socket dismantle

when MPTCP server accepts an incoming connection, it clones its listener
socket. However, the pointer to 'inet_opt' for the new socket has the same
value as the original one: as a consequence, on program exit it's possible
to observe the following splat:

  BUG: KASAN: double-free in inet_sock_destruct+0x54f/0x8b0
  Free of addr ffff888485950880 by task swapper/25/0

  CPU: 25 PID: 0 Comm: swapper/25 Kdump: loaded Not tainted 6.8.0-rc1+ #609
  Hardware name: Supermicro SYS-6027R-72RF/X9DRH-7TF/7F/iTF/iF, BIOS 3.0  07/26/2013
  Call Trace:
   &lt;IRQ&gt;
   dump_stack_lvl+0x32/0x50
   print_report+0xca/0x620
   kasan_report_invalid_free+0x64/0x90
   __kasan_slab_free+0x1aa/0x1f0
   kfree+0xed/0x2e0
   inet_sock_destruct+0x54f/0x8b0
   __sk_destruct+0x48/0x5b0
   rcu_do_batch+0x34e/0xd90
   rcu_core+0x559/0xac0
   __do_softirq+0x183/0x5a4
   irq_exit_rcu+0x12d/0x170
   sysvec_apic_timer_interrupt+0x6b/0x80
   &lt;/IRQ&gt;
   &lt;TASK&gt;
   asm_sysvec_apic_timer_interrupt+0x16/0x20
  RIP: 0010:cpuidle_enter_state+0x175/0x300
  Code: 30 00 0f 84 1f 01 00 00 83 e8 01 83 f8 ff 75 e5 48 83 c4 18 44 89 e8 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc fb 45 85 ed &lt;0f&gt; 89 60 ff ff ff 48 c1 e5 06 48 c7 43 18 00 00 00 00 48 83 44 2b
  RSP: 0018:ffff888481cf7d90 EFLAGS: 00000202
  RAX: 0000000000000000 RBX: ffff88887facddc8 RCX: 0000000000000000
  RDX: 1ffff1110ff588b1 RSI: 0000000000000019 RDI: ffff88887fac4588
  RBP: 0000000000000004 R08: 0000000000000002 R09: 0000000000043080
  R10: 0009b02ea273363f R11: ffff88887fabf42b R12: ffffffff932592e0
  R13: 0000000000000004 R14: 0000000000000000 R15: 00000022c880ec80
   cpuidle_enter+0x4a/0xa0
   do_idle+0x310/0x410
   cpu_startup_entry+0x51/0x60
   start_secondary+0x211/0x270
   secondary_startup_64_no_verify+0x184/0x18b
   &lt;/TASK&gt;

  Allocated by task 6853:
   kasan_save_stack+0x1c/0x40
   kasan_save_track+0x10/0x30
   __kasan_kmalloc+0xa6/0xb0
   __kmalloc+0x1eb/0x450
   cipso_v4_sock_setattr+0x96/0x360
   netlbl_sock_setattr+0x132/0x1f0
   selinux_netlbl_socket_post_create+0x6c/0x110
   selinux_socket_post_create+0x37b/0x7f0
   security_socket_post_create+0x63/0xb0
   __sock_create+0x305/0x450
   __sys_socket_create.part.23+0xbd/0x130
   __sys_socket+0x37/0xb0
   __x64_sys_socket+0x6f/0xb0
   do_syscall_64+0x83/0x160
   entry_SYSCALL_64_after_hwframe+0x6e/0x76

  Freed by task 6858:
   kasan_save_stack+0x1c/0x40
   kasan_save_track+0x10/0x30
   kasan_save_free_info+0x3b/0x60
   __kasan_slab_free+0x12c/0x1f0
   kfree+0xed/0x2e0
   inet_sock_destruct+0x54f/0x8b0
   __sk_destruct+0x48/0x5b0
   subflow_ulp_release+0x1f0/0x250
   tcp_cleanup_ulp+0x6e/0x110
   tcp_v4_destroy_sock+0x5a/0x3a0
   inet_csk_destroy_sock+0x135/0x390
   tcp_fin+0x416/0x5c0
   tcp_data_queue+0x1bc8/0x4310
   tcp_rcv_state_process+0x15a3/0x47b0
   tcp_v4_do_rcv+0x2c1/0x990
   tcp_v4_rcv+0x41fb/0x5ed0
   ip_protocol_deliver_rcu+0x6d/0x9f0
   ip_local_deliver_finish+0x278/0x360
   ip_local_deliver+0x182/0x2c0
   ip_rcv+0xb5/0x1c0
   __netif_receive_skb_one_core+0x16e/0x1b0
   process_backlog+0x1e3/0x650
   __napi_poll+0xa6/0x500
   net_rx_action+0x740/0xbb0
   __do_softirq+0x183/0x5a4

  The buggy address belongs to the object at ffff888485950880
   which belongs to the cache kmalloc-64 of size 64
  The buggy address is located 0 bytes inside of
   64-byte region [ffff888485950880, ffff8884859508c0)

  The buggy address belongs to the physical page:
  page:0000000056d1e95e refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888485950700 pfn:0x485950
  flags: 0x57ffffc0000800(slab|node=1|zone=2|lastcpupid=0x1fffff)
  page_type: 0xffffffff()
  raw: 0057ffffc0000800 ffff88810004c640 ffffea00121b8ac0 dead000000000006
  raw: ffff888485950700 0000000000200019 00000001ffffffff 0000000000000000
  page dumped because: kasan: bad access detected

  Memory state around the buggy address:
   ffff888485950780: fa fb fb
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-26782</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26782.html</URL>
        <Description>CVE-2024-26782</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222590</URL>
        <Description>SUSE Bug 1222590</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault()

When trying to use copy_from_kernel_nofault() to read vsyscall page
through a bpf program, the following oops was reported:

  BUG: unable to handle page fault for address: ffffffffff600000
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 3231067 P4D 3231067 PUD 3233067 PMD 3235067 PTE 0
  Oops: 0000 [#1] PREEMPT SMP PTI
  CPU: 1 PID: 20390 Comm: test_progs ...... 6.7.0+ #58
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) ......
  RIP: 0010:copy_from_kernel_nofault+0x6f/0x110
  ......
  Call Trace:
   &lt;TASK&gt;
   ? copy_from_kernel_nofault+0x6f/0x110
   bpf_probe_read_kernel+0x1d/0x50
   bpf_prog_2061065e56845f08_do_probe_read+0x51/0x8d
   trace_call_bpf+0xc5/0x1c0
   perf_call_bpf_enter.isra.0+0x69/0xb0
   perf_syscall_enter+0x13e/0x200
   syscall_trace_enter+0x188/0x1c0
   do_syscall_64+0xb5/0xe0
   entry_SYSCALL_64_after_hwframe+0x6e/0x76
   &lt;/TASK&gt;
  ......
  ---[ end trace 0000000000000000 ]---

The oops is triggered when:

1) A bpf program uses bpf_probe_read_kernel() to read from the vsyscall
page and invokes copy_from_kernel_nofault() which in turn calls
__get_user_asm().

2) Because the vsyscall page address is not readable from kernel space,
a page fault exception is triggered accordingly.

3) handle_page_fault() considers the vsyscall page address as a user
space address instead of a kernel space address. This results in the
fix-up setup by bpf not being applied and a page_fault_oops() is invoked
due to SMAP.

Considering handle_page_fault() has already considered the vsyscall page
address as a userspace address, fix the problem by disallowing vsyscall
page read for copy_from_kernel_nofault().</Note>
    </Notes>
    <CVE>CVE-2024-26906</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26906.html</URL>
        <Description>CVE-2024-26906</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223202</URL>
        <Description>SUSE Bug 1223202</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: esp: fix bad handling of pages from page_pool

When the skb is reorganized during esp_output (!esp-&gt;inline), the pages
coming from the original skb fragments are supposed to be released back
to the system through put_page. But if the skb fragment pages are
originating from a page_pool, calling put_page on them will trigger a
page_pool leak which will eventually result in a crash.

This leak can be easily observed when using CONFIG_DEBUG_VM and doing
ipsec + gre (non offloaded) forwarding:

  BUG: Bad page state in process ksoftirqd/16  pfn:1451b6
  page:00000000de2b8d32 refcount:0 mapcount:0 mapping:0000000000000000 index:0x1451b6000 pfn:0x1451b6
  flags: 0x200000000000000(node=0|zone=2)
  page_type: 0xffffffff()
  raw: 0200000000000000 dead000000000040 ffff88810d23c000 0000000000000000
  raw: 00000001451b6000 0000000000000001 00000000ffffffff 0000000000000000
  page dumped because: page_pool leak
  Modules linked in: ip_gre gre mlx5_ib mlx5_core xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink iptable_nat nf_nat xt_addrtype br_netfilter rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_iscsi ib_umad rdma_cm ib_ipoib iw_cm ib_cm ib_uverbs ib_core overlay zram zsmalloc fuse [last unloaded: mlx5_core]
  CPU: 16 PID: 96 Comm: ksoftirqd/16 Not tainted 6.8.0-rc4+ #22
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x36/0x50
   bad_page+0x70/0xf0
   free_unref_page_prepare+0x27a/0x460
   free_unref_page+0x38/0x120
   esp_ssg_unref.isra.0+0x15f/0x200
   esp_output_tail+0x66d/0x780
   esp_xmit+0x2c5/0x360
   validate_xmit_xfrm+0x313/0x370
   ? validate_xmit_skb+0x1d/0x330
   validate_xmit_skb_list+0x4c/0x70
   sch_direct_xmit+0x23e/0x350
   __dev_queue_xmit+0x337/0xba0
   ? nf_hook_slow+0x3f/0xd0
   ip_finish_output2+0x25e/0x580
   iptunnel_xmit+0x19b/0x240
   ip_tunnel_xmit+0x5fb/0xb60
   ipgre_xmit+0x14d/0x280 [ip_gre]
   dev_hard_start_xmit+0xc3/0x1c0
   __dev_queue_xmit+0x208/0xba0
   ? nf_hook_slow+0x3f/0xd0
   ip_finish_output2+0x1ca/0x580
   ip_sublist_rcv_finish+0x32/0x40
   ip_sublist_rcv+0x1b2/0x1f0
   ? ip_rcv_finish_core.constprop.0+0x460/0x460
   ip_list_rcv+0x103/0x130
   __netif_receive_skb_list_core+0x181/0x1e0
   netif_receive_skb_list_internal+0x1b3/0x2c0
   napi_gro_receive+0xc8/0x200
   gro_cell_poll+0x52/0x90
   __napi_poll+0x25/0x1a0
   net_rx_action+0x28e/0x300
   __do_softirq+0xc3/0x276
   ? sort_range+0x20/0x20
   run_ksoftirqd+0x1e/0x30
   smpboot_thread_fn+0xa6/0x130
   kthread+0xcd/0x100
   ? kthread_complete_and_exit+0x20/0x20
   ret_from_fork+0x31/0x50
   ? kthread_complete_and_exit+0x20/0x20
   ret_from_fork_asm+0x11/0x20
   &lt;/TASK&gt;

The suggested fix is to introduce a new wrapper (skb_page_unref) that
covers page refcounting for page_pool pages as well.</Note>
    </Notes>
    <CVE>CVE-2024-26953</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-26953.html</URL>
        <Description>CVE-2024-26953</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223656</URL>
        <Description>SUSE Bug 1223656</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

erspan: make sure erspan_base_hdr is present in skb-&gt;head

syzbot reported a problem in ip6erspan_rcv() [1]

Issue is that ip6erspan_rcv() (and erspan_rcv()) no longer make
sure erspan_base_hdr is present in skb linear part (skb-&gt;head)
before getting @ver field from it.

Add the missing pskb_may_pull() calls.

v2: Reload iph pointer in erspan_rcv() after pskb_may_pull()
    because skb-&gt;head might have changed.

[1]

 BUG: KMSAN: uninit-value in pskb_may_pull_reason include/linux/skbuff.h:2742 [inline]
 BUG: KMSAN: uninit-value in pskb_may_pull include/linux/skbuff.h:2756 [inline]
 BUG: KMSAN: uninit-value in ip6erspan_rcv net/ipv6/ip6_gre.c:541 [inline]
 BUG: KMSAN: uninit-value in gre_rcv+0x11f8/0x1930 net/ipv6/ip6_gre.c:610
  pskb_may_pull_reason include/linux/skbuff.h:2742 [inline]
  pskb_may_pull include/linux/skbuff.h:2756 [inline]
  ip6erspan_rcv net/ipv6/ip6_gre.c:541 [inline]
  gre_rcv+0x11f8/0x1930 net/ipv6/ip6_gre.c:610
  ip6_protocol_deliver_rcu+0x1d4c/0x2ca0 net/ipv6/ip6_input.c:438
  ip6_input_finish net/ipv6/ip6_input.c:483 [inline]
  NF_HOOK include/linux/netfilter.h:314 [inline]
  ip6_input+0x15d/0x430 net/ipv6/ip6_input.c:492
  ip6_mc_input+0xa7e/0xc80 net/ipv6/ip6_input.c:586
  dst_input include/net/dst.h:460 [inline]
  ip6_rcv_finish+0x955/0x970 net/ipv6/ip6_input.c:79
  NF_HOOK include/linux/netfilter.h:314 [inline]
  ipv6_rcv+0xde/0x390 net/ipv6/ip6_input.c:310
  __netif_receive_skb_one_core net/core/dev.c:5538 [inline]
  __netif_receive_skb+0x1da/0xa00 net/core/dev.c:5652
  netif_receive_skb_internal net/core/dev.c:5738 [inline]
  netif_receive_skb+0x58/0x660 net/core/dev.c:5798
  tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1549
  tun_get_user+0x5566/0x69e0 drivers/net/tun.c:2002
  tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048
  call_write_iter include/linux/fs.h:2108 [inline]
  new_sync_write fs/read_write.c:497 [inline]
  vfs_write+0xb63/0x1520 fs/read_write.c:590
  ksys_write+0x20f/0x4c0 fs/read_write.c:643
  __do_sys_write fs/read_write.c:655 [inline]
  __se_sys_write fs/read_write.c:652 [inline]
  __x64_sys_write+0x93/0xe0 fs/read_write.c:652
 do_syscall_64+0xd5/0x1f0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

Uninit was created at:
  slab_post_alloc_hook mm/slub.c:3804 [inline]
  slab_alloc_node mm/slub.c:3845 [inline]
  kmem_cache_alloc_node+0x613/0xc50 mm/slub.c:3888
  kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:577
  __alloc_skb+0x35b/0x7a0 net/core/skbuff.c:668
  alloc_skb include/linux/skbuff.h:1318 [inline]
  alloc_skb_with_frags+0xc8/0xbf0 net/core/skbuff.c:6504
  sock_alloc_send_pskb+0xa81/0xbf0 net/core/sock.c:2795
  tun_alloc_skb drivers/net/tun.c:1525 [inline]
  tun_get_user+0x209a/0x69e0 drivers/net/tun.c:1846
  tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048
  call_write_iter include/linux/fs.h:2108 [inline]
  new_sync_write fs/read_write.c:497 [inline]
  vfs_write+0xb63/0x1520 fs/read_write.c:590
  ksys_write+0x20f/0x4c0 fs/read_write.c:643
  __do_sys_write fs/read_write.c:655 [inline]
  __se_sys_write fs/read_write.c:652 [inline]
  __x64_sys_write+0x93/0xe0 fs/read_write.c:652
 do_syscall_64+0xd5/0x1f0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

CPU: 1 PID: 5045 Comm: syz-executor114 Not tainted 6.9.0-rc1-syzkaller-00021-g962490525cff #0</Note>
    </Notes>
    <CVE>CVE-2024-35888</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35888.html</URL>
        <Description>CVE-2024-35888</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224518</URL>
        <Description>SUSE Bug 1224518</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: check A-MSDU format more carefully

If it looks like there's another subframe in the A-MSDU
but the header isn't fully there, we can end up reading
data out of bounds, only to discard later. Make this a
bit more careful and check if the subframe header can
even be present.</Note>
    </Notes>
    <CVE>CVE-2024-35937</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35937.html</URL>
        <Description>CVE-2024-35937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224526</URL>
        <Description>SUSE Bug 1224526</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

arm64: tlb: Fix TLBI RANGE operand

KVM/arm64 relies on TLBI RANGE feature to flush TLBs when the dirty
pages are collected by VMM and the page table entries become write
protected during live migration. Unfortunately, the operand passed
to the TLBI RANGE instruction isn't correctly sorted out due to the
commit 117940aa6e5f ("KVM: arm64: Define kvm_tlb_flush_vmid_range()").
It leads to crash on the destination VM after live migration because
TLBs aren't flushed completely and some of the dirty pages are missed.

For example, I have a VM where 8GB memory is assigned, starting from
0x40000000 (1GB). Note that the host has 4KB as the base page size.
In the middile of migration, kvm_tlb_flush_vmid_range() is executed
to flush TLBs. It passes MAX_TLBI_RANGE_PAGES as the argument to
__kvm_tlb_flush_vmid_range() and __flush_s2_tlb_range_op(). SCALE#3
and NUM#31, corresponding to MAX_TLBI_RANGE_PAGES, isn't supported
by __TLBI_RANGE_NUM(). In this specific case, -1 has been returned
from __TLBI_RANGE_NUM() for SCALE#3/2/1/0 and rejected by the loop
in the __flush_tlb_range_op() until the variable @scale underflows
and becomes -9, 0xffff708000040000 is set as the operand. The operand
is wrong since it's sorted out by __TLBI_VADDR_RANGE() according to
invalid @scale and @num.

Fix it by extending __TLBI_RANGE_NUM() to support the combination of
SCALE#3 and NUM#31. With the changes, [-1 31] instead of [-1 30] can
be returned from the macro, meaning the TLBs for 0x200000 pages in the
above example can be flushed in one shoot with SCALE#3 and NUM#31. The
macro TLBI_RANGE_MASK is dropped since no one uses it any more. The
comments are also adjusted accordingly.</Note>
    </Notes>
    <CVE>CVE-2024-35980</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-35980.html</URL>
        <Description>CVE-2024-35980</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224574</URL>
        <Description>SUSE Bug 1224574</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: relax socket state check at accept time.

Christoph reported the following splat:

WARNING: CPU: 1 PID: 772 at net/ipv4/af_inet.c:761 __inet_accept+0x1f4/0x4a0
Modules linked in:
CPU: 1 PID: 772 Comm: syz-executor510 Not tainted 6.9.0-rc7-g7da7119fe22b #56
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-2.el7 04/01/2014
RIP: 0010:__inet_accept+0x1f4/0x4a0 net/ipv4/af_inet.c:759
Code: 04 38 84 c0 0f 85 87 00 00 00 41 c7 04 24 03 00 00 00 48 83 c4 10 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc e8 ec b7 da fd &lt;0f&gt; 0b e9 7f fe ff ff e8 e0 b7 da fd 0f 0b e9 fe fe ff ff 89 d9 80
RSP: 0018:ffffc90000c2fc58 EFLAGS: 00010293
RAX: ffffffff836bdd14 RBX: 0000000000000000 RCX: ffff888104668000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: dffffc0000000000 R08: ffffffff836bdb89 R09: fffff52000185f64
R10: dffffc0000000000 R11: fffff52000185f64 R12: dffffc0000000000
R13: 1ffff92000185f98 R14: ffff88810754d880 R15: ffff8881007b7800
FS:  000000001c772880(0000) GS:ffff88811b280000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fb9fcf2e178 CR3: 00000001045d2002 CR4: 0000000000770ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 inet_accept+0x138/0x1d0 net/ipv4/af_inet.c:786
 do_accept+0x435/0x620 net/socket.c:1929
 __sys_accept4_file net/socket.c:1969 [inline]
 __sys_accept4+0x9b/0x110 net/socket.c:1999
 __do_sys_accept net/socket.c:2016 [inline]
 __se_sys_accept net/socket.c:2013 [inline]
 __x64_sys_accept+0x7d/0x90 net/socket.c:2013
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x58/0x100 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x4315f9
Code: fd ff 48 81 c4 80 00 00 00 e9 f1 fe ff ff 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 0f 83 ab b4 fd ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffdb26d9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002b
RAX: ffffffffffffffda RBX: 0000000000400300 RCX: 00000000004315f9
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004
RBP: 00000000006e1018 R08: 0000000000400300 R09: 0000000000400300
R10: 0000000000400300 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000040cdf0 R14: 000000000040ce80 R15: 0000000000000055
 &lt;/TASK&gt;

The reproducer invokes shutdown() before entering the listener status.
After commit 94062790aedb ("tcp: defer shutdown(SEND_SHUTDOWN) for
TCP_SYN_RECV sockets"), the above causes the child to reach the accept
syscall in FIN_WAIT1 status.

Eric noted we can relax the existing assertion in __inet_accept()</Note>
    </Notes>
    <CVE>CVE-2024-36484</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36484.html</URL>
        <Description>CVE-2024-36484</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226872</URL>
        <Description>SUSE Bug 1226872</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: fix out-of-bounds access in ops_init

net_alloc_generic is called by net_alloc, which is called without any
locking. It reads max_gen_ptrs, which is changed under pernet_ops_rwsem. It
is read twice, first to allocate an array, then to set s.len, which is
later used to limit the bounds of the array access.

It is possible that the array is allocated and another thread is
registering a new pernet ops, increments max_gen_ptrs, which is then used
to set s.len with a larger than allocated length for the variable array.

Fix it by reading max_gen_ptrs only once in net_alloc_generic. If
max_gen_ptrs is later incremented, it will be caught in net_assign_generic.</Note>
    </Notes>
    <CVE>CVE-2024-36883</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36883.html</URL>
        <Description>CVE-2024-36883</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225725</URL>
        <Description>SUSE Bug 1225725</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tipc: fix UAF in error path

Sam Page (sam4k) working with Trend Micro Zero Day Initiative reported
a UAF in the tipc_buf_append() error path:

BUG: KASAN: slab-use-after-free in kfree_skb_list_reason+0x47e/0x4c0
linux/net/core/skbuff.c:1183
Read of size 8 at addr ffff88804d2a7c80 by task poc/8034

CPU: 1 PID: 8034 Comm: poc Not tainted 6.8.2 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
1.16.0-debian-1.16.0-5 04/01/2014
Call Trace:
 &lt;IRQ&gt;
 __dump_stack linux/lib/dump_stack.c:88
 dump_stack_lvl+0xd9/0x1b0 linux/lib/dump_stack.c:106
 print_address_description linux/mm/kasan/report.c:377
 print_report+0xc4/0x620 linux/mm/kasan/report.c:488
 kasan_report+0xda/0x110 linux/mm/kasan/report.c:601
 kfree_skb_list_reason+0x47e/0x4c0 linux/net/core/skbuff.c:1183
 skb_release_data+0x5af/0x880 linux/net/core/skbuff.c:1026
 skb_release_all linux/net/core/skbuff.c:1094
 __kfree_skb linux/net/core/skbuff.c:1108
 kfree_skb_reason+0x12d/0x210 linux/net/core/skbuff.c:1144
 kfree_skb linux/./include/linux/skbuff.h:1244
 tipc_buf_append+0x425/0xb50 linux/net/tipc/msg.c:186
 tipc_link_input+0x224/0x7c0 linux/net/tipc/link.c:1324
 tipc_link_rcv+0x76e/0x2d70 linux/net/tipc/link.c:1824
 tipc_rcv+0x45f/0x10f0 linux/net/tipc/node.c:2159
 tipc_udp_recv+0x73b/0x8f0 linux/net/tipc/udp_media.c:390
 udp_queue_rcv_one_skb+0xad2/0x1850 linux/net/ipv4/udp.c:2108
 udp_queue_rcv_skb+0x131/0xb00 linux/net/ipv4/udp.c:2186
 udp_unicast_rcv_skb+0x165/0x3b0 linux/net/ipv4/udp.c:2346
 __udp4_lib_rcv+0x2594/0x3400 linux/net/ipv4/udp.c:2422
 ip_protocol_deliver_rcu+0x30c/0x4e0 linux/net/ipv4/ip_input.c:205
 ip_local_deliver_finish+0x2e4/0x520 linux/net/ipv4/ip_input.c:233
 NF_HOOK linux/./include/linux/netfilter.h:314
 NF_HOOK linux/./include/linux/netfilter.h:308
 ip_local_deliver+0x18e/0x1f0 linux/net/ipv4/ip_input.c:254
 dst_input linux/./include/net/dst.h:461
 ip_rcv_finish linux/net/ipv4/ip_input.c:449
 NF_HOOK linux/./include/linux/netfilter.h:314
 NF_HOOK linux/./include/linux/netfilter.h:308
 ip_rcv+0x2c5/0x5d0 linux/net/ipv4/ip_input.c:569
 __netif_receive_skb_one_core+0x199/0x1e0 linux/net/core/dev.c:5534
 __netif_receive_skb+0x1f/0x1c0 linux/net/core/dev.c:5648
 process_backlog+0x101/0x6b0 linux/net/core/dev.c:5976
 __napi_poll.constprop.0+0xba/0x550 linux/net/core/dev.c:6576
 napi_poll linux/net/core/dev.c:6645
 net_rx_action+0x95a/0xe90 linux/net/core/dev.c:6781
 __do_softirq+0x21f/0x8e7 linux/kernel/softirq.c:553
 do_softirq linux/kernel/softirq.c:454
 do_softirq+0xb2/0xf0 linux/kernel/softirq.c:441
 &lt;/IRQ&gt;
 &lt;TASK&gt;
 __local_bh_enable_ip+0x100/0x120 linux/kernel/softirq.c:381
 local_bh_enable linux/./include/linux/bottom_half.h:33
 rcu_read_unlock_bh linux/./include/linux/rcupdate.h:851
 __dev_queue_xmit+0x871/0x3ee0 linux/net/core/dev.c:4378
 dev_queue_xmit linux/./include/linux/netdevice.h:3169
 neigh_hh_output linux/./include/net/neighbour.h:526
 neigh_output linux/./include/net/neighbour.h:540
 ip_finish_output2+0x169f/0x2550 linux/net/ipv4/ip_output.c:235
 __ip_finish_output linux/net/ipv4/ip_output.c:313
 __ip_finish_output+0x49e/0x950 linux/net/ipv4/ip_output.c:295
 ip_finish_output+0x31/0x310 linux/net/ipv4/ip_output.c:323
 NF_HOOK_COND linux/./include/linux/netfilter.h:303
 ip_output+0x13b/0x2a0 linux/net/ipv4/ip_output.c:433
 dst_output linux/./include/net/dst.h:451
 ip_local_out linux/net/ipv4/ip_output.c:129
 ip_send_skb+0x3e5/0x560 linux/net/ipv4/ip_output.c:1492
 udp_send_skb+0x73f/0x1530 linux/net/ipv4/udp.c:963
 udp_sendmsg+0x1a36/0x2b40 linux/net/ipv4/udp.c:1250
 inet_sendmsg+0x105/0x140 linux/net/ipv4/af_inet.c:850
 sock_sendmsg_nosec linux/net/socket.c:730
 __sock_sendmsg linux/net/socket.c:745
 __sys_sendto+0x42c/0x4e0 linux/net/socket.c:2191
 __do_sys_sendto linux/net/socket.c:2203
 __se_sys_sendto linux/net/socket.c:2199
 __x64_sys_sendto+0xe0/0x1c0 linux/net/socket.c:2199
 do_syscall_x64 linux/arch/x86/entry/common.c:52
 do_syscall_
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-36886</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36886.html</URL>
        <Description>CVE-2024-36886</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225730</URL>
        <Description>SUSE Bug 1225730</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225742</URL>
        <Description>SUSE Bug 1225742</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets

TCP_SYN_RECV state is really special, it is only used by
cross-syn connections, mostly used by fuzzers.

In the following crash [1], syzbot managed to trigger a divide
by zero in tcp_rcv_space_adjust()

A socket makes the following state transitions,
without ever calling tcp_init_transfer(),
meaning tcp_init_buffer_space() is also not called.

         TCP_CLOSE
connect()
         TCP_SYN_SENT
         TCP_SYN_RECV
shutdown() -&gt; tcp_shutdown(sk, SEND_SHUTDOWN)
         TCP_FIN_WAIT1

To fix this issue, change tcp_shutdown() to not
perform a TCP_SYN_RECV -&gt; TCP_FIN_WAIT1 transition,
which makes no sense anyway.

When tcp_rcv_state_process() later changes socket state
from TCP_SYN_RECV to TCP_ESTABLISH, then look at
sk-&gt;sk_shutdown to finally enter TCP_FIN_WAIT1 state,
and send a FIN packet from a sane socket state.

This means tcp_send_fin() can now be called from BH
context, and must use GFP_ATOMIC allocations.

[1]
divide error: 0000 [#1] PREEMPT SMP KASAN NOPTI
CPU: 1 PID: 5084 Comm: syz-executor358 Not tainted 6.9.0-rc6-syzkaller-00022-g98369dccd2f8 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
 RIP: 0010:tcp_rcv_space_adjust+0x2df/0x890 net/ipv4/tcp_input.c:767
Code: e3 04 4c 01 eb 48 8b 44 24 38 0f b6 04 10 84 c0 49 89 d5 0f 85 a5 03 00 00 41 8b 8e c8 09 00 00 89 e8 29 c8 48 0f af c3 31 d2 &lt;48&gt; f7 f1 48 8d 1c 43 49 8d 96 76 08 00 00 48 89 d0 48 c1 e8 03 48
RSP: 0018:ffffc900031ef3f0 EFLAGS: 00010246
RAX: 0c677a10441f8f42 RBX: 000000004fb95e7e RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000027d4b11f R08: ffffffff89e535a4 R09: 1ffffffff25e6ab7
R10: dffffc0000000000 R11: ffffffff8135e920 R12: ffff88802a9f8d30
R13: dffffc0000000000 R14: ffff88802a9f8d00 R15: 1ffff1100553f2da
FS:  00005555775c0380(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f1155bf2304 CR3: 000000002b9f2000 CR4: 0000000000350ef0
Call Trace:
 &lt;TASK&gt;
  tcp_recvmsg_locked+0x106d/0x25a0 net/ipv4/tcp.c:2513
  tcp_recvmsg+0x25d/0x920 net/ipv4/tcp.c:2578
  inet6_recvmsg+0x16a/0x730 net/ipv6/af_inet6.c:680
  sock_recvmsg_nosec net/socket.c:1046 [inline]
  sock_recvmsg+0x109/0x280 net/socket.c:1068
  ____sys_recvmsg+0x1db/0x470 net/socket.c:2803
  ___sys_recvmsg net/socket.c:2845 [inline]
  do_recvmmsg+0x474/0xae0 net/socket.c:2939
  __sys_recvmmsg net/socket.c:3018 [inline]
  __do_sys_recvmmsg net/socket.c:3041 [inline]
  __se_sys_recvmmsg net/socket.c:3034 [inline]
  __x64_sys_recvmmsg+0x199/0x250 net/socket.c:3034
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7faeb6363db9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 c1 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffcc1997168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007faeb6363db9
RDX: 0000000000000001 RSI: 0000000020000bc0 RDI: 0000000000000005
RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000001c
R10: 0000000000000122 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000001</Note>
    </Notes>
    <CVE>CVE-2024-36905</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36905.html</URL>
        <Description>CVE-2024-36905</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225742</URL>
        <Description>SUSE Bug 1225742</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr()

vgic_v2_parse_attr() is responsible for finding the vCPU that matches
the user-provided CPUID, which (of course) may not be valid. If the ID
is invalid, kvm_get_vcpu_by_id() returns NULL, which isn't handled
gracefully.

Similar to the GICv3 uaccess flow, check that kvm_get_vcpu_by_id()
actually returns something and fail the ioctl if not.</Note>
    </Notes>
    <CVE>CVE-2024-36953</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36953.html</URL>
        <Description>CVE-2024-36953</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225812</URL>
        <Description>SUSE Bug 1225812</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tipc: fix a possible memleak in tipc_buf_append

__skb_linearize() doesn't free the skb when it fails, so move
'*buf = NULL' after __skb_linearize(), so that the skb can be
freed on the err path.</Note>
    </Notes>
    <CVE>CVE-2024-36954</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36954.html</URL>
        <Description>CVE-2024-36954</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225764</URL>
        <Description>SUSE Bug 1225764</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow

There is a possibility of buffer overflow in
show_rcu_tasks_trace_gp_kthread() if counters, passed
to sprintf() are huge. Counter numbers, needed for this
are unrealistically high, but buffer overflow is still
possible.

Use snprintf() with buffer size instead of sprintf().

Found by Linux Verification Center (linuxtesting.org) with SVACE.</Note>
    </Notes>
    <CVE>CVE-2024-38577</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38577.html</URL>
        <Description>CVE-2024-38577</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226631</URL>
        <Description>SUSE Bug 1226631</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netrom: fix possible dead-lock in nr_rt_ioctl()

syzbot loves netrom, and found a possible deadlock in nr_rt_ioctl [1]

Make sure we always acquire nr_node_list_lock before nr_node_lock(nr_node)

[1]
WARNING: possible circular locking dependency detected
6.9.0-rc7-syzkaller-02147-g654de42f3fc6 #0 Not tainted
------------------------------------------------------
syz-executor350/5129 is trying to acquire lock:
 ffff8880186e2070 (&amp;nr_node-&gt;node_lock){+...}-{2:2}, at: spin_lock_bh include/linux/spinlock.h:356 [inline]
 ffff8880186e2070 (&amp;nr_node-&gt;node_lock){+...}-{2:2}, at: nr_node_lock include/net/netrom.h:152 [inline]
 ffff8880186e2070 (&amp;nr_node-&gt;node_lock){+...}-{2:2}, at: nr_dec_obs net/netrom/nr_route.c:464 [inline]
 ffff8880186e2070 (&amp;nr_node-&gt;node_lock){+...}-{2:2}, at: nr_rt_ioctl+0x1bb/0x1090 net/netrom/nr_route.c:697

but task is already holding lock:
 ffffffff8f7053b8 (nr_node_list_lock){+...}-{2:2}, at: spin_lock_bh include/linux/spinlock.h:356 [inline]
 ffffffff8f7053b8 (nr_node_list_lock){+...}-{2:2}, at: nr_dec_obs net/netrom/nr_route.c:462 [inline]
 ffffffff8f7053b8 (nr_node_list_lock){+...}-{2:2}, at: nr_rt_ioctl+0x10a/0x1090 net/netrom/nr_route.c:697

which lock already depends on the new lock.

the existing dependency chain (in reverse order) is:

-&gt; #1 (nr_node_list_lock){+...}-{2:2}:
        lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
        __raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline]
        _raw_spin_lock_bh+0x35/0x50 kernel/locking/spinlock.c:178
        spin_lock_bh include/linux/spinlock.h:356 [inline]
        nr_remove_node net/netrom/nr_route.c:299 [inline]
        nr_del_node+0x4b4/0x820 net/netrom/nr_route.c:355
        nr_rt_ioctl+0xa95/0x1090 net/netrom/nr_route.c:683
        sock_do_ioctl+0x158/0x460 net/socket.c:1222
        sock_ioctl+0x629/0x8e0 net/socket.c:1341
        vfs_ioctl fs/ioctl.c:51 [inline]
        __do_sys_ioctl fs/ioctl.c:904 [inline]
        __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:890
        do_syscall_x64 arch/x86/entry/common.c:52 [inline]
        do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
       entry_SYSCALL_64_after_hwframe+0x77/0x7f

-&gt; #0 (&amp;nr_node-&gt;node_lock){+...}-{2:2}:
        check_prev_add kernel/locking/lockdep.c:3134 [inline]
        check_prevs_add kernel/locking/lockdep.c:3253 [inline]
        validate_chain+0x18cb/0x58e0 kernel/locking/lockdep.c:3869
        __lock_acquire+0x1346/0x1fd0 kernel/locking/lockdep.c:5137
        lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
        __raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline]
        _raw_spin_lock_bh+0x35/0x50 kernel/locking/spinlock.c:178
        spin_lock_bh include/linux/spinlock.h:356 [inline]
        nr_node_lock include/net/netrom.h:152 [inline]
        nr_dec_obs net/netrom/nr_route.c:464 [inline]
        nr_rt_ioctl+0x1bb/0x1090 net/netrom/nr_route.c:697
        sock_do_ioctl+0x158/0x460 net/socket.c:1222
        sock_ioctl+0x629/0x8e0 net/socket.c:1341
        vfs_ioctl fs/ioctl.c:51 [inline]
        __do_sys_ioctl fs/ioctl.c:904 [inline]
        __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:890
        do_syscall_x64 arch/x86/entry/common.c:52 [inline]
        do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
       entry_SYSCALL_64_after_hwframe+0x77/0x7f

other info that might help us debug this:

 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(nr_node_list_lock);
                               lock(&amp;nr_node-&gt;node_lock);
                               lock(nr_node_list_lock);
  lock(&amp;nr_node-&gt;node_lock);

 *** DEADLOCK ***

1 lock held by syz-executor350/5129:
  #0: ffffffff8f7053b8 (nr_node_list_lock){+...}-{2:2}, at: spin_lock_bh include/linux/spinlock.h:356 [inline]
  #0: ffffffff8f7053b8 (nr_node_list_lock){+...}-{2:2}, at: nr_dec_obs net/netrom/nr_route.c:462 [inline]
  #0: ffffffff8f70
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-38589</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38589.html</URL>
        <Description>CVE-2024-38589</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226748</URL>
        <Description>SUSE Bug 1226748</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

cpufreq: exit() callback is optional

The exit() callback is optional and shouldn't be called without checking
a valid pointer first.

Also, we must clear freq_table pointer even if the exit() callback isn't
present.</Note>
    </Notes>
    <CVE>CVE-2024-38615</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38615.html</URL>
        <Description>CVE-2024-38615</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226592</URL>
        <Description>SUSE Bug 1226592</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

cpufreq: amd-pstate: fix memory leak on CPU EPP exit

The cpudata memory from kzalloc() in amd_pstate_epp_cpu_init() is
not freed in the analogous exit function, so fix that.

[ rjw: Subject and changelog edits ]</Note>
    </Notes>
    <CVE>CVE-2024-40997</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-40997.html</URL>
        <Description>CVE-2024-40997</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227853</URL>
        <Description>SUSE Bug 1227853</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()

xattr in ocfs2 maybe 'non-indexed', which saved with additional space
requested.  It's better to check if the memory is out of bound before
memcmp, although this possibility mainly comes from crafted poisonous
images.</Note>
    </Notes>
    <CVE>CVE-2024-41016</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-41016.html</URL>
        <Description>CVE-2024-41016</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228410</URL>
        <Description>SUSE Bug 1228410</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

sched/deadline: Fix task_struct reference leak

During the execution of the following stress test with linux-rt:

stress-ng --cyclic 30 --timeout 30 --minimize --quiet

kmemleak frequently reported a memory leak concerning the task_struct:

unreferenced object 0xffff8881305b8000 (size 16136):
  comm "stress-ng", pid 614, jiffies 4294883961 (age 286.412s)
  object hex dump (first 32 bytes):
    02 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00  .@..............
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  debug hex dump (first 16 bytes):
    53 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00  S...............
  backtrace:
    [&lt;00000000046b6790&gt;] dup_task_struct+0x30/0x540
    [&lt;00000000c5ca0f0b&gt;] copy_process+0x3d9/0x50e0
    [&lt;00000000ced59777&gt;] kernel_clone+0xb0/0x770
    [&lt;00000000a50befdc&gt;] __do_sys_clone+0xb6/0xf0
    [&lt;000000001dbf2008&gt;] do_syscall_64+0x5d/0xf0
    [&lt;00000000552900ff&gt;] entry_SYSCALL_64_after_hwframe+0x6e/0x76

The issue occurs in start_dl_timer(), which increments the task_struct
reference count and sets a timer. The timer callback, dl_task_timer,
is supposed to decrement the reference count upon expiration. However,
if enqueue_task_dl() is called before the timer expires and cancels it,
the reference count is not decremented, leading to the leak.

This patch fixes the reference leak by ensuring the task_struct
reference count is properly decremented when the timer is canceled.</Note>
    </Notes>
    <CVE>CVE-2024-41023</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-41023.html</URL>
        <Description>CVE-2024-41023</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228430</URL>
        <Description>SUSE Bug 1228430</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

filelock: fix potential use-after-free in posix_lock_inode

Light Hsieh reported a KASAN UAF warning in trace_posix_lock_inode().
The request pointer had been changed earlier to point to a lock entry
that was added to the inode's list. However, before the tracepoint could
fire, another task raced in and freed that lock.

Fix this by moving the tracepoint inside the spinlock, which should
ensure that this doesn't happen.</Note>
    </Notes>
    <CVE>CVE-2024-41049</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-41049.html</URL>
        <Description>CVE-2024-41049</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228486</URL>
        <Description>SUSE Bug 1228486</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mm: avoid overflows in dirty throttling logic

The dirty throttling logic is interspersed with assumptions that dirty
limits in PAGE_SIZE units fit into 32-bit (so that various multiplications
fit into 64-bits).  If limits end up being larger, we will hit overflows,
possible divisions by 0 etc.  Fix these problems by never allowing so
large dirty limits as they have dubious practical value anyway.  For
dirty_bytes / dirty_background_bytes interfaces we can just refuse to set
so large limits.  For dirty_ratio / dirty_background_ratio it isn't so
simple as the dirty limit is computed from the amount of available memory
which can change due to memory hotplug etc.  So when converting dirty
limits from ratios to numbers of pages, we just don't allow the result to
exceed UINT_MAX.

This is root-only triggerable problem which occurs when the operator
sets dirty limits to &gt;16 TB.</Note>
    </Notes>
    <CVE>CVE-2024-42131</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-42131.html</URL>
        <Description>CVE-2024-42131</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228650</URL>
        <Description>SUSE Bug 1228650</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: missing check virtio

Two missing check in virtio_net_hdr_to_skb() allowed syzbot
to crash kernels again

1. After the skb_segment function the buffer may become non-linear
(nr_frags != 0), but since the SKBTX_SHARED_FRAG flag is not set anywhere
the __skb_linearize function will not be executed, then the buffer will
remain non-linear. Then the condition (offset &gt;= skb_headlen(skb))
becomes true, which causes WARN_ON_ONCE in skb_checksum_help.

2. The struct sk_buff and struct virtio_net_hdr members must be
mathematically related.
(gso_size) must be greater than (needed) otherwise WARN_ON_ONCE.
(remainder) must be greater than (needed) otherwise WARN_ON_ONCE.
(remainder) may be 0 if division is without remainder.

offset+2 (4191) &gt; skb_headlen() (1116)
WARNING: CPU: 1 PID: 5084 at net/core/dev.c:3303 skb_checksum_help+0x5e2/0x740 net/core/dev.c:3303
Modules linked in:
CPU: 1 PID: 5084 Comm: syz-executor336 Not tainted 6.7.0-rc3-syzkaller-00014-gdf60cee26a2e #0
Hardware name: Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023
RIP: 0010:skb_checksum_help+0x5e2/0x740 net/core/dev.c:3303
Code: 89 e8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 52 01 00 00 44 89 e2 2b 53 74 4c 89 ee 48 c7 c7 40 57 e9 8b e8 af 8f dd f8 90 &lt;0f&gt; 0b 90 90 e9 87 fe ff ff e8 40 0f 6e f9 e9 4b fa ff ff 48 89 ef
RSP: 0018:ffffc90003a9f338 EFLAGS: 00010286
RAX: 0000000000000000 RBX: ffff888025125780 RCX: ffffffff814db209
RDX: ffff888015393b80 RSI: ffffffff814db216 RDI: 0000000000000001
RBP: ffff8880251257f4 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000001 R12: 000000000000045c
R13: 000000000000105f R14: ffff8880251257f0 R15: 000000000000105d
FS:  0000555555c24380(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000002000f000 CR3: 0000000023151000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 ip_do_fragment+0xa1b/0x18b0 net/ipv4/ip_output.c:777
 ip_fragment.constprop.0+0x161/0x230 net/ipv4/ip_output.c:584
 ip_finish_output_gso net/ipv4/ip_output.c:286 [inline]
 __ip_finish_output net/ipv4/ip_output.c:308 [inline]
 __ip_finish_output+0x49c/0x650 net/ipv4/ip_output.c:295
 ip_finish_output+0x31/0x310 net/ipv4/ip_output.c:323
 NF_HOOK_COND include/linux/netfilter.h:303 [inline]
 ip_output+0x13b/0x2a0 net/ipv4/ip_output.c:433
 dst_output include/net/dst.h:451 [inline]
 ip_local_out+0xaf/0x1a0 net/ipv4/ip_output.c:129
 iptunnel_xmit+0x5b4/0x9b0 net/ipv4/ip_tunnel_core.c:82
 ipip6_tunnel_xmit net/ipv6/sit.c:1034 [inline]
 sit_tunnel_xmit+0xed2/0x28f0 net/ipv6/sit.c:1076
 __netdev_start_xmit include/linux/netdevice.h:4940 [inline]
 netdev_start_xmit include/linux/netdevice.h:4954 [inline]
 xmit_one net/core/dev.c:3545 [inline]
 dev_hard_start_xmit+0x13d/0x6d0 net/core/dev.c:3561
 __dev_queue_xmit+0x7c1/0x3d60 net/core/dev.c:4346
 dev_queue_xmit include/linux/netdevice.h:3134 [inline]
 packet_xmit+0x257/0x380 net/packet/af_packet.c:276
 packet_snd net/packet/af_packet.c:3087 [inline]
 packet_sendmsg+0x24ca/0x5240 net/packet/af_packet.c:3119
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg+0xd5/0x180 net/socket.c:745
 __sys_sendto+0x255/0x340 net/socket.c:2190
 __do_sys_sendto net/socket.c:2202 [inline]
 __se_sys_sendto net/socket.c:2198 [inline]
 __x64_sys_sendto+0xe0/0x1b0 net/socket.c:2198
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x40/0x110 arch/x86/entry/common.c:82
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

Found by Linux Verification Center (linuxtesting.org) with Syzkaller</Note>
    </Notes>
    <CVE>CVE-2024-43817</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-43817.html</URL>
        <Description>CVE-2024-43817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1229312</URL>
        <Description>SUSE Bug 1229312</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: drop bad gso csum_start and offset in virtio_net_hdr

Tighten csum_start and csum_offset checks in virtio_net_hdr_to_skb
for GSO packets.

The function already checks that a checksum requested with
VIRTIO_NET_HDR_F_NEEDS_CSUM is in skb linear. But for GSO packets
this might not hold for segs after segmentation.

Syzkaller demonstrated to reach this warning in skb_checksum_help

	offset = skb_checksum_start_offset(skb);
	ret = -EINVAL;
	if (WARN_ON_ONCE(offset &gt;= skb_headlen(skb)))

By injecting a TSO packet:

WARNING: CPU: 1 PID: 3539 at net/core/dev.c:3284 skb_checksum_help+0x3d0/0x5b0
 ip_do_fragment+0x209/0x1b20 net/ipv4/ip_output.c:774
 ip_finish_output_gso net/ipv4/ip_output.c:279 [inline]
 __ip_finish_output+0x2bd/0x4b0 net/ipv4/ip_output.c:301
 iptunnel_xmit+0x50c/0x930 net/ipv4/ip_tunnel_core.c:82
 ip_tunnel_xmit+0x2296/0x2c70 net/ipv4/ip_tunnel.c:813
 __gre_xmit net/ipv4/ip_gre.c:469 [inline]
 ipgre_xmit+0x759/0xa60 net/ipv4/ip_gre.c:661
 __netdev_start_xmit include/linux/netdevice.h:4850 [inline]
 netdev_start_xmit include/linux/netdevice.h:4864 [inline]
 xmit_one net/core/dev.c:3595 [inline]
 dev_hard_start_xmit+0x261/0x8c0 net/core/dev.c:3611
 __dev_queue_xmit+0x1b97/0x3c90 net/core/dev.c:4261
 packet_snd net/packet/af_packet.c:3073 [inline]

The geometry of the bad input packet at tcp_gso_segment:

[   52.003050][ T8403] skb len=12202 headroom=244 headlen=12093 tailroom=0
[   52.003050][ T8403] mac=(168,24) mac_len=24 net=(192,52) trans=244
[   52.003050][ T8403] shinfo(txflags=0 nr_frags=1 gso(size=1552 type=3 segs=0))
[   52.003050][ T8403] csum(0x60000c7 start=199 offset=1536
ip_summed=3 complete_sw=0 valid=0 level=0)

Mitigate with stricter input validation.

csum_offset: for GSO packets, deduce the correct value from gso_type.
This is already done for USO. Extend it to TSO. Let UFO be:
udp[46]_ufo_fragment ignores these fields and always computes the
checksum in software.

csum_start: finding the real offset requires parsing to the transport
header. Do not add a parser, use existing segmentation parsing. Thanks
to SKB_GSO_DODGY, that also catches bad packets that are hw offloaded.
Again test both TSO and USO. Do not test UFO for the above reason, and
do not test UDP tunnel offload.

GSO packet are almost always CHECKSUM_PARTIAL. USO packets may be
CHECKSUM_NONE since commit 10154dbded6d6 ("udp: Allow GSO transmit
from devices with no checksum offload"), but then still these fields
are initialized correctly in udp4_hwcsum/udp6_hwcsum_outgoing. So no
need to test for ip_summed == CHECKSUM_PARTIAL first.

This revises an existing fix mentioned in the Fixes tag, which broke
small packets with GSO offload, as detected by kselftests.</Note>
    </Notes>
    <CVE>CVE-2024-43897</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-43897.html</URL>
        <Description>CVE-2024-43897</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1229752</URL>
        <Description>SUSE Bug 1229752</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

idpf: fix UAFs when destroying the queues

The second tagged commit started sometimes (very rarely, but possible)
throwing WARNs from
net/core/page_pool.c:page_pool_disable_direct_recycling().
Turned out idpf frees interrupt vectors with embedded NAPIs *before*
freeing the queues making page_pools' NAPI pointers lead to freed
memory before these pools are destroyed by libeth.
It's not clear whether there are other accesses to the freed vectors
when destroying the queues, but anyway, we usually free queue/interrupt
vectors only when the queues are destroyed and the NAPIs are guaranteed
to not be referenced anywhere.

Invert the allocation and freeing logic making queue/interrupt vectors
be allocated first and freed last. Vectors don't require queues to be
present, so this is safe. Additionally, this change allows to remove
that useless queue-&gt;q_vector pointer cleanup, as vectors are still
valid when freeing the queues (+ both are freed within one function,
so it's not clear why nullify the pointers at all).</Note>
    </Notes>
    <CVE>CVE-2024-44932</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-44932.html</URL>
        <Description>CVE-2024-44932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1229808</URL>
        <Description>SUSE Bug 1229808</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

idpf: fix memory leaks and crashes while performing a soft reset

The second tagged commit introduced a UAF, as it removed restoring
q_vector-&gt;vport pointers after reinitializating the structures.
This is due to that all queue allocation functions are performed here
with the new temporary vport structure and those functions rewrite
the backpointers to the vport. Then, this new struct is freed and
the pointers start leading to nowhere.

But generally speaking, the current logic is very fragile. It claims
to be more reliable when the system is low on memory, but in fact, it
consumes two times more memory as at the moment of running this
function, there are two vports allocated with their queues and vectors.
Moreover, it claims to prevent the driver from running into "bad state",
but in fact, any error during the rebuild leaves the old vport in the
partially allocated state.
Finally, if the interface is down when the function is called, it always
allocates a new queue set, but when the user decides to enable the
interface later on, vport_open() allocates them once again, IOW there's
a clear memory leak here.

Just don't allocate a new queue set when performing a reset, that solves
crashes and memory leaks. Readd the old queue number and reopen the
interface on rollback - that solves limbo states when the device is left
disabled and/or without HW queues enabled.</Note>
    </Notes>
    <CVE>CVE-2024-44964</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-44964.html</URL>
        <Description>CVE-2024-44964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230220</URL>
        <Description>SUSE Bug 1230220</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: hns3: fix a deadlock problem when config TC during resetting

When config TC during the reset process, may cause a deadlock, the flow is
as below:
                             pf reset start
                                 |
                                 ▼
                              ......
setup tc                         |
    |                            ▼
    ▼                      DOWN: napi_disable()
napi_disable()(skip)             |
    |                            |
    ▼                            ▼
  ......                      ......
    |                            |
    ▼                            |
napi_enable()                    |
                                 ▼
                           UINIT: netif_napi_del()
                                 |
                                 ▼
                              ......
                                 |
                                 ▼
                           INIT: netif_napi_add()
                                 |
                                 ▼
                              ......                 global reset start
                                 |                      |
                                 ▼                      ▼
                           UP: napi_enable()(skip)    ......
                                 |                      |
                                 ▼                      ▼
                              ......                 napi_disable()

In reset process, the driver will DOWN the port and then UINIT, in this
case, the setup tc process will UP the port before UINIT, so cause the
problem. Adds a DOWN process in UINIT to fix it.</Note>
    </Notes>
    <CVE>CVE-2024-44995</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-44995.html</URL>
        <Description>CVE-2024-44995</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230231</URL>
        <Description>SUSE Bug 1230231</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

pktgen: use cpus_read_lock() in pg_net_init()

I have seen the WARN_ON(smp_processor_id() != cpu) firing
in pktgen_thread_worker() during tests.

We must use cpus_read_lock()/cpus_read_unlock()
around the for_each_online_cpu(cpu) loop.

While we are at it use WARN_ON_ONCE() to avoid a possible syslog flood.</Note>
    </Notes>
    <CVE>CVE-2024-46681</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46681.html</URL>
        <Description>CVE-2024-46681</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230558</URL>
        <Description>SUSE Bug 1230558</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

sch/netem: fix use after free in netem_dequeue

If netem_dequeue() enqueues packet to inner qdisc and that qdisc
returns __NET_XMIT_STOLEN. The packet is dropped but
qdisc_tree_reduce_backlog() is not called to update the parent's
q.qlen, leading to the similar use-after-free as Commit
e04991a48dbaf382 ("netem: fix return value if duplicate enqueue
fails")

Commands to trigger KASAN UaF:

ip link add type dummy
ip link set lo up
ip link set dummy0 up
tc qdisc add dev lo parent root handle 1: drr
tc filter add dev lo parent 1: basic classid 1:1
tc class add dev lo classid 1:1 drr
tc qdisc add dev lo parent 1:1 handle 2: netem
tc qdisc add dev lo parent 2: handle 3: drr
tc filter add dev lo parent 3: basic classid 3:1 action mirred egress
redirect dev dummy0
tc class add dev lo classid 3:1 drr
ping -c1 -W0.01 localhost # Trigger bug
tc class del dev lo classid 1:1
tc class add dev lo classid 1:1 drr
ping -c1 -W0.01 localhost # UaF</Note>
    </Notes>
    <CVE>CVE-2024-46800</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46800.html</URL>
        <Description>CVE-2024-46800</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230827</URL>
        <Description>SUSE Bug 1230827</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: added NULL check at start of dc_validate_stream

[Why]
prevent invalid memory access

[How]
check if dc and stream are NULL</Note>
    </Notes>
    <CVE>CVE-2024-46802</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46802.html</URL>
        <Description>CVE-2024-46802</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231111</URL>
        <Description>SUSE Bug 1231111</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add array index check for hdcp ddc access

[Why]
Coverity reports OVERRUN warning. Do not check if array
index valid.

[How]
Check msg_id valid and valid array index.</Note>
    </Notes>
    <CVE>CVE-2024-46804</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46804.html</URL>
        <Description>CVE-2024-46804</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231132</URL>
        <Description>SUSE Bug 1231132</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix the waring dereferencing hive

Check the amdgpu_hive_info *hive that maybe is NULL.</Note>
    </Notes>
    <CVE>CVE-2024-46805</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46805.html</URL>
        <Description>CVE-2024-46805</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231135</URL>
        <Description>SUSE Bug 1231135</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/amdgpu: Check tbo resource pointer

Validate tbo resource pointer, skip if NULL</Note>
    </Notes>
    <CVE>CVE-2024-46807</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46807.html</URL>
        <Description>CVE-2024-46807</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231138</URL>
        <Description>SUSE Bug 1231138</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/bridge: tc358767: Check if fully initialized before signalling HPD event via IRQ

Make sure the connector is fully initialized before signalling any
HPD events via drm_kms_helper_hotplug_event(), otherwise this may
lead to NULL pointer dereference.</Note>
    </Notes>
    <CVE>CVE-2024-46810</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46810.html</URL>
        <Description>CVE-2024-46810</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231178</URL>
        <Description>SUSE Bug 1231178</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration

[Why]
Coverity reports Memory - illegal accesses.

[How]
Skip inactive planes.</Note>
    </Notes>
    <CVE>CVE-2024-46812</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46812.html</URL>
        <Description>CVE-2024-46812</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231187</URL>
        <Description>SUSE Bug 1231187</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: the warning dereferencing obj for nbio_v7_4

if ras_manager obj null, don't print NBIO err data</Note>
    </Notes>
    <CVE>CVE-2024-46819</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46819.html</URL>
        <Description>CVE-2024-46819</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231202</URL>
        <Description>SUSE Bug 1231202</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pm: Fix negative array index read

Avoid using the negative values
for clk_idex as an index into an array pptable-&gt;DpmDescriptor.

V2: fix clk_index return check (Tim Huang)</Note>
    </Notes>
    <CVE>CVE-2024-46821</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46821.html</URL>
        <Description>CVE-2024-46821</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231169</URL>
        <Description>SUSE Bug 1231169</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix smatch static checker warning

adev-&gt;gfx.imu.funcs could be NULL</Note>
    </Notes>
    <CVE>CVE-2024-46835</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46835.html</URL>
        <Description>CVE-2024-46835</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231098</URL>
        <Description>SUSE Bug 1231098</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info

The MBX_TIMEOUT return code is not handled in lpfc_get_sfp_info and the
routine unconditionally frees submitted mailbox commands regardless of
return status.  The issue is that for MBX_TIMEOUT cases, when firmware
returns SFP information at a later time, that same mailbox memory region
references previously freed memory in its cmpl routine.

Fix by adding checks for the MBX_TIMEOUT return code.  During mailbox
resource cleanup, check the mbox flag to make sure that the wait did not
timeout.  If the MBOX_WAKE flag is not set, then do not free the resources
because it will be freed when firmware completes the mailbox at a later
time in its cmpl routine.

Also, increase the timeout from 30 to 60 seconds to accommodate boot
scripts requiring longer timeouts.</Note>
    </Notes>
    <CVE>CVE-2024-46842</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46842.html</URL>
        <Description>CVE-2024-46842</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231101</URL>
        <Description>SUSE Bug 1231101</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="50">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

spi: nxp-fspi: fix the KASAN report out-of-bounds bug

Change the memcpy length to fix the out-of-bounds issue when writing the
data that is not 4 byte aligned to TX FIFO.

To reproduce the issue, write 3 bytes data to NOR chip.

dd if=3b of=/dev/mtd0
[   36.926103] ==================================================================
[   36.933409] BUG: KASAN: slab-out-of-bounds in nxp_fspi_exec_op+0x26ec/0x2838
[   36.940514] Read of size 4 at addr ffff00081037c2a0 by task dd/455
[   36.946721]
[   36.948235] CPU: 3 UID: 0 PID: 455 Comm: dd Not tainted 6.11.0-rc5-gc7b0e37c8434 #1070
[   36.956185] Hardware name: Freescale i.MX8QM MEK (DT)
[   36.961260] Call trace:
[   36.963723]  dump_backtrace+0x90/0xe8
[   36.967414]  show_stack+0x18/0x24
[   36.970749]  dump_stack_lvl+0x78/0x90
[   36.974451]  print_report+0x114/0x5cc
[   36.978151]  kasan_report+0xa4/0xf0
[   36.981670]  __asan_report_load_n_noabort+0x1c/0x28
[   36.986587]  nxp_fspi_exec_op+0x26ec/0x2838
[   36.990800]  spi_mem_exec_op+0x8ec/0xd30
[   36.994762]  spi_mem_no_dirmap_read+0x190/0x1e0
[   36.999323]  spi_mem_dirmap_write+0x238/0x32c
[   37.003710]  spi_nor_write_data+0x220/0x374
[   37.007932]  spi_nor_write+0x110/0x2e8
[   37.011711]  mtd_write_oob_std+0x154/0x1f0
[   37.015838]  mtd_write_oob+0x104/0x1d0
[   37.019617]  mtd_write+0xb8/0x12c
[   37.022953]  mtdchar_write+0x224/0x47c
[   37.026732]  vfs_write+0x1e4/0x8c8
[   37.030163]  ksys_write+0xec/0x1d0
[   37.033586]  __arm64_sys_write+0x6c/0x9c
[   37.037539]  invoke_syscall+0x6c/0x258
[   37.041327]  el0_svc_common.constprop.0+0x160/0x22c
[   37.046244]  do_el0_svc+0x44/0x5c
[   37.049589]  el0_svc+0x38/0x78
[   37.052681]  el0t_64_sync_handler+0x13c/0x158
[   37.057077]  el0t_64_sync+0x190/0x194
[   37.060775]
[   37.062274] Allocated by task 455:
[   37.065701]  kasan_save_stack+0x2c/0x54
[   37.069570]  kasan_save_track+0x20/0x3c
[   37.073438]  kasan_save_alloc_info+0x40/0x54
[   37.077736]  __kasan_kmalloc+0xa0/0xb8
[   37.081515]  __kmalloc_noprof+0x158/0x2f8
[   37.085563]  mtd_kmalloc_up_to+0x120/0x154
[   37.089690]  mtdchar_write+0x130/0x47c
[   37.093469]  vfs_write+0x1e4/0x8c8
[   37.096901]  ksys_write+0xec/0x1d0
[   37.100332]  __arm64_sys_write+0x6c/0x9c
[   37.104287]  invoke_syscall+0x6c/0x258
[   37.108064]  el0_svc_common.constprop.0+0x160/0x22c
[   37.112972]  do_el0_svc+0x44/0x5c
[   37.116319]  el0_svc+0x38/0x78
[   37.119401]  el0t_64_sync_handler+0x13c/0x158
[   37.123788]  el0t_64_sync+0x190/0x194
[   37.127474]
[   37.128977] The buggy address belongs to the object at ffff00081037c2a0
[   37.128977]  which belongs to the cache kmalloc-8 of size 8
[   37.141177] The buggy address is located 0 bytes inside of
[   37.141177]  allocated 3-byte region [ffff00081037c2a0, ffff00081037c2a3)
[   37.153465]
[   37.154971] The buggy address belongs to the physical page:
[   37.160559] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x89037c
[   37.168596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.175149] page_type: 0xfdffffff(slab)
[   37.179021] raw: 0bfffe0000000000 ffff000800002500 dead000000000122 0000000000000000
[   37.186788] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000
[   37.194553] page dumped because: kasan: bad access detected
[   37.200144]
[   37.201647] Memory state around the buggy address:
[   37.206460]  ffff00081037c180: fa fc fc fc fa fc fc fc fa fc fc fc fa fc fc fc
[   37.213701]  ffff00081037c200: fa fc fc fc 05 fc fc fc 03 fc fc fc 02 fc fc fc
[   37.220946] &gt;ffff00081037c280: 06 fc fc fc 03 fc fc fc fc fc fc fc fc fc fc fc
[   37.228186]                                ^
[   37.232473]  ffff00081037c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.239718]  ffff00081037c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.246962] ==============================================================
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-46853</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46853.html</URL>
        <Description>CVE-2024-46853</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231083</URL>
        <Description>SUSE Bug 1231083</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="51">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses

The panasonic laptop code in various places uses the SINF array with index
values of 0 - SINF_CUR_BRIGHT(0x0d) without checking that the SINF array
is big enough.

Not all panasonic laptops have this many SINF array entries, for example
the Toughbook CF-18 model only has 10 SINF array entries. So it only
supports the AC+DC brightness entries and mute.

Check that the SINF array has a minimum size which covers all AC+DC
brightness entries and refuse to load if the SINF array is smaller.

For higher SINF indexes hide the sysfs attributes when the SINF array
does not contain an entry for that attribute, avoiding show()/store()
accessing the array out of bounds and add bounds checking to the probe()
and resume() code accessing these.</Note>
    </Notes>
    <CVE>CVE-2024-46859</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46859.html</URL>
        <Description>CVE-2024-46859</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231089</URL>
        <Description>SUSE Bug 1231089</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="52">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

x86/hyperv: fix kexec crash due to VP assist page corruption

commit 9636be85cc5b ("x86/hyperv: Fix hyperv_pcpu_input_arg handling when
CPUs go online/offline") introduces a new cpuhp state for hyperv
initialization.

cpuhp_setup_state() returns the state number if state is
CPUHP_AP_ONLINE_DYN or CPUHP_BP_PREPARE_DYN and 0 for all other states.
For the hyperv case, since a new cpuhp state was introduced it would
return 0. However, in hv_machine_shutdown(), the cpuhp_remove_state() call
is conditioned upon "hyperv_init_cpuhp &gt; 0". This will never be true and
so hv_cpu_die() won't be called on all CPUs. This means the VP assist page
won't be reset. When the kexec kernel tries to setup the VP assist page
again, the hypervisor corrupts the memory region of the old VP assist page
causing a panic in case the kexec kernel is using that memory elsewhere.
This was originally fixed in commit dfe94d4086e4 ("x86/hyperv: Fix kexec
panic/hang issues").

Get rid of hyperv_init_cpuhp entirely since we are no longer using a
dynamic cpuhp state and use CPUHP_AP_HYPERV_ONLINE directly with
cpuhp_remove_state().</Note>
    </Notes>
    <CVE>CVE-2024-46864</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46864.html</URL>
        <Description>CVE-2024-46864</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231108</URL>
        <Description>SUSE Bug 1231108</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="53">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX

[Why &amp; How]
It actually exposes '6' types in enum dmub_notification_type. Not 5. Using smaller
number to create array dmub_callback &amp; dmub_thread_offload has potential to access
item out of array bound. Fix it.</Note>
    </Notes>
    <CVE>CVE-2024-46871</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-46871.html</URL>
        <Description>CVE-2024-46871</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231434</URL>
        <Description>SUSE Bug 1231434</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="54">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

staging: iio: frequency: ad9834: Validate frequency parameter value

In ad9834_write_frequency() clk_get_rate() can return 0. In such case
ad9834_calc_freqreg() call will lead to division by zero. Checking
'if (fout &gt; (clk_freq / 2))' doesn't protect in case of 'fout' is 0.
ad9834_write_frequency() is called from ad9834_write(), where fout is
taken from text buffer, which can contain any value.

Modify parameters checking.

Found by Linux Verification Center (linuxtesting.org) with SVACE.</Note>
    </Notes>
    <CVE>CVE-2024-47663</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47663.html</URL>
        <Description>CVE-2024-47663</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231441</URL>
        <Description>SUSE Bug 1231441</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="55">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

i3c: mipi-i3c-hci: Error out instead on BUG_ON() in IBI DMA setup

Definitely condition dma_get_cache_alignment * defined value &gt; 256
during driver initialization is not reason to BUG_ON(). Turn that to
graceful error out with -EINVAL.</Note>
    </Notes>
    <CVE>CVE-2024-47665</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47665.html</URL>
        <Description>CVE-2024-47665</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231452</URL>
        <Description>SUSE Bug 1231452</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="56">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0)

Errata #i2037 in AM65x/DRA80xM Processors Silicon Revision 1.0
(SPRZ452D_July 2018_Revised December 2019 [1]) mentions when an
inbound PCIe TLP spans more than two internal AXI 128-byte bursts,
the bus may corrupt the packet payload and the corrupt data may
cause associated applications or the processor to hang.

The workaround for Errata #i2037 is to limit the maximum read
request size and maximum payload size to 128 bytes. Add workaround
for Errata #i2037 here.

The errata and workaround is applicable only to AM65x SR 1.0 and
later versions of the silicon will have this fixed.

[1] -&gt; https://www.ti.com/lit/er/sprz452i/sprz452i.pdf</Note>
    </Notes>
    <CVE>CVE-2024-47667</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47667.html</URL>
        <Description>CVE-2024-47667</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231481</URL>
        <Description>SUSE Bug 1231481</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="57">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix state management in error path of log writing function

After commit a694291a6211 ("nilfs2: separate wait function from
nilfs_segctor_write") was applied, the log writing function
nilfs_segctor_do_construct() was able to issue I/O requests continuously
even if user data blocks were split into multiple logs across segments,
but two potential flaws were introduced in its error handling.

First, if nilfs_segctor_begin_construction() fails while creating the
second or subsequent logs, the log writing function returns without
calling nilfs_segctor_abort_construction(), so the writeback flag set on
pages/folios will remain uncleared.  This causes page cache operations to
hang waiting for the writeback flag.  For example,
truncate_inode_pages_final(), which is called via nilfs_evict_inode() when
an inode is evicted from memory, will hang.

Second, the NILFS_I_COLLECTED flag set on normal inodes remain uncleared. 
As a result, if the next log write involves checkpoint creation, that's
fine, but if a partial log write is performed that does not, inodes with
NILFS_I_COLLECTED set are erroneously removed from the "sc_dirty_files"
list, and their data and b-tree blocks may not be written to the device,
corrupting the block mapping.

Fix these issues by uniformly calling nilfs_segctor_abort_construction()
on failure of each step in the loop in nilfs_segctor_do_construct(),
having it clean up logs and segment usages according to progress, and
correcting the conditions for calling nilfs_redirty_inodes() to ensure
that the NILFS_I_COLLECTED flag is cleared.</Note>
    </Notes>
    <CVE>CVE-2024-47669</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47669.html</URL>
        <Description>CVE-2024-47669</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231474</URL>
        <Description>SUSE Bug 1231474</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="58">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ocfs2: add bounds checking to ocfs2_xattr_find_entry()

Add a paranoia check to make sure it doesn't stray beyond valid memory
region containing ocfs2 xattr entries when scanning for a match.  It will
prevent out-of-bound access in case of crafted images.</Note>
    </Notes>
    <CVE>CVE-2024-47670</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47670.html</URL>
        <Description>CVE-2024-47670</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231537</URL>
        <Description>SUSE Bug 1231537</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="59">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

USB: usbtmc: prevent kernel-usb-infoleak

The syzbot reported a kernel-usb-infoleak in usbtmc_write,
we need to clear the structure before filling fields.</Note>
    </Notes>
    <CVE>CVE-2024-47671</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47671.html</URL>
        <Description>CVE-2024-47671</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231541</URL>
        <Description>SUSE Bug 1231541</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="60">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

vfs: fix race between evice_inodes() and find_inode()&amp;iput()

Hi, all

Recently I noticed a bug[1] in btrfs, after digged it into
and I believe it'a race in vfs.

Let's assume there's a inode (ie ino 261) with i_count 1 is
called by iput(), and there's a concurrent thread calling
generic_shutdown_super().

cpu0:                              cpu1:
iput() // i_count is 1
  -&gt;spin_lock(inode)
  -&gt;dec i_count to 0
  -&gt;iput_final()                    generic_shutdown_super()
    -&gt;__inode_add_lru()               -&gt;evict_inodes()
      // cause some reason[2]           -&gt;if (atomic_read(inode-&gt;i_count)) continue;
      // return before                  // inode 261 passed the above check
      // list_lru_add_obj()             // and then schedule out
   -&gt;spin_unlock()
// note here: the inode 261
// was still at sb list and hash list,
// and I_FREEING|I_WILL_FREE was not been set

btrfs_iget()
  // after some function calls
  -&gt;find_inode()
    // found the above inode 261
    -&gt;spin_lock(inode)
   // check I_FREEING|I_WILL_FREE
   // and passed
      -&gt;__iget()
    -&gt;spin_unlock(inode)                // schedule back
                                        -&gt;spin_lock(inode)
                                        // check (I_NEW|I_FREEING|I_WILL_FREE) flags,
                                        // passed and set I_FREEING
iput()                                  -&gt;spin_unlock(inode)
  -&gt;spin_lock(inode)			  -&gt;evict()
  // dec i_count to 0
  -&gt;iput_final()
    -&gt;spin_unlock()
    -&gt;evict()

Now, we have two threads simultaneously evicting
the same inode, which may trigger the BUG(inode-&gt;i_state &amp; I_CLEAR)
statement both within clear_inode() and iput().

To fix the bug, recheck the inode-&gt;i_count after holding i_lock.
Because in the most scenarios, the first check is valid, and
the overhead of spin_lock() can be reduced.

If there is any misunderstanding, please let me know, thanks.

[1]: https://lore.kernel.org/linux-btrfs/000000000000eabe1d0619c48986@google.com/
[2]: The reason might be 1. SB_ACTIVE was removed or 2. mapping_shrinkable()
return false when I reproduced the bug.</Note>
    </Notes>
    <CVE>CVE-2024-47679</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47679.html</URL>
        <Description>CVE-2024-47679</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231930</URL>
        <Description>SUSE Bug 1231930</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="61">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: sd: Fix off-by-one error in sd_read_block_characteristics()

Ff the device returns page 0xb1 with length 8 (happens with qemu v2.x, for
example), sd_read_block_characteristics() may attempt an out-of-bounds
memory access when accessing the zoned field at offset 8.</Note>
    </Notes>
    <CVE>CVE-2024-47682</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47682.html</URL>
        <Description>CVE-2024-47682</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231856</URL>
        <Description>SUSE Bug 1231856</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="62">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

IB/core: Fix ib_cache_setup_one error flow cleanup

When ib_cache_update return an error, we exit ib_cache_setup_one
instantly with no proper cleanup, even though before this we had
already successfully done gid_table_setup_one, that results in
the kernel WARN below.

Do proper cleanup using gid_table_cleanup_one before returning
the err in order to fix the issue.

WARNING: CPU: 4 PID: 922 at drivers/infiniband/core/cache.c:806 gid_table_release_one+0x181/0x1a0
Modules linked in:
CPU: 4 UID: 0 PID: 922 Comm: c_repro Not tainted 6.11.0-rc1+ #3
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
RIP: 0010:gid_table_release_one+0x181/0x1a0
Code: 44 8b 38 75 0c e8 2f cb 34 ff 4d 8b b5 28 05 00 00 e8 23 cb 34 ff 44 89 f9 89 da 4c 89 f6 48 c7 c7 d0 58 14 83 e8 4f de 21 ff &lt;0f&gt; 0b 4c 8b 75 30 e9 54 ff ff ff 48 8    3 c4 10 5b 5d 41 5c 41 5d 41
RSP: 0018:ffffc90002b835b0 EFLAGS: 00010286
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff811c8527
RDX: 0000000000000000 RSI: ffffffff811c8534 RDI: 0000000000000001
RBP: ffff8881011b3d00 R08: ffff88810b3abe00 R09: 205d303839303631
R10: 666572207972746e R11: 72746e6520444947 R12: 0000000000000001
R13: ffff888106390000 R14: ffff8881011f2110 R15: 0000000000000001
FS:  00007fecc3b70800(0000) GS:ffff88813bd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000340 CR3: 000000010435a001 CR4: 00000000003706b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 ? show_regs+0x94/0xa0
 ? __warn+0x9e/0x1c0
 ? gid_table_release_one+0x181/0x1a0
 ? report_bug+0x1f9/0x340
 ? gid_table_release_one+0x181/0x1a0
 ? handle_bug+0xa2/0x110
 ? exc_invalid_op+0x31/0xa0
 ? asm_exc_invalid_op+0x16/0x20
 ? __warn_printk+0xc7/0x180
 ? __warn_printk+0xd4/0x180
 ? gid_table_release_one+0x181/0x1a0
 ib_device_release+0x71/0xe0
 ? __pfx_ib_device_release+0x10/0x10
 device_release+0x44/0xd0
 kobject_put+0x135/0x3d0
 put_device+0x20/0x30
 rxe_net_add+0x7d/0xa0
 rxe_newlink+0xd7/0x190
 nldev_newlink+0x1b0/0x2a0
 ? __pfx_nldev_newlink+0x10/0x10
 rdma_nl_rcv_msg+0x1ad/0x2e0
 rdma_nl_rcv_skb.constprop.0+0x176/0x210
 netlink_unicast+0x2de/0x400
 netlink_sendmsg+0x306/0x660
 __sock_sendmsg+0x110/0x120
 ____sys_sendmsg+0x30e/0x390
 ___sys_sendmsg+0x9b/0xf0
 ? kstrtouint+0x6e/0xa0
 ? kstrtouint_from_user+0x7c/0xb0
 ? get_pid_task+0xb0/0xd0
 ? proc_fail_nth_write+0x5b/0x140
 ? __fget_light+0x9a/0x200
 ? preempt_count_add+0x47/0xa0
 __sys_sendmsg+0x61/0xd0
 do_syscall_64+0x50/0x110
 entry_SYSCALL_64_after_hwframe+0x76/0x7e</Note>
    </Notes>
    <CVE>CVE-2024-47693</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47693.html</URL>
        <Description>CVE-2024-47693</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232013</URL>
        <Description>SUSE Bug 1232013</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="63">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds

In the function init_conns(), after the create_con() and create_cm() for
loop if something fails. In the cleanup for loop after the destroy tag, we
access out of bound memory because cid is set to clt_path-&gt;s.con_num.

This commits resets the cid to clt_path-&gt;s.con_num - 1, to stay in bounds
in the cleanup loop later.</Note>
    </Notes>
    <CVE>CVE-2024-47695</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47695.html</URL>
        <Description>CVE-2024-47695</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231931</URL>
        <Description>SUSE Bug 1231931</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="64">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency

In the commit aee2424246f9 ("RDMA/iwcm: Fix a use-after-free related to
destroying CM IDs"), the function flush_workqueue is invoked to flush the
work queue iwcm_wq.

But at that time, the work queue iwcm_wq was created via the function
alloc_ordered_workqueue without the flag WQ_MEM_RECLAIM.

Because the current process is trying to flush the whole iwcm_wq, if
iwcm_wq doesn't have the flag WQ_MEM_RECLAIM, verify that the current
process is not reclaiming memory or running on a workqueue which doesn't
have the flag WQ_MEM_RECLAIM as that can break forward-progress guarantee
leading to a deadlock.

The call trace is as below:

[  125.350876][ T1430] Call Trace:
[  125.356281][ T1430]  &lt;TASK&gt;
[ 125.361285][ T1430] ? __warn (kernel/panic.c:693)
[ 125.367640][ T1430] ? check_flush_dependency (kernel/workqueue.c:3706 (discriminator 9))
[ 125.375689][ T1430] ? report_bug (lib/bug.c:180 lib/bug.c:219)
[ 125.382505][ T1430] ? handle_bug (arch/x86/kernel/traps.c:239)
[ 125.388987][ T1430] ? exc_invalid_op (arch/x86/kernel/traps.c:260 (discriminator 1))
[ 125.395831][ T1430] ? asm_exc_invalid_op (arch/x86/include/asm/idtentry.h:621)
[ 125.403125][ T1430] ? check_flush_dependency (kernel/workqueue.c:3706 (discriminator 9))
[ 125.410984][ T1430] ? check_flush_dependency (kernel/workqueue.c:3706 (discriminator 9))
[ 125.418764][ T1430] __flush_workqueue (kernel/workqueue.c:3970)
[ 125.426021][ T1430] ? __pfx___might_resched (kernel/sched/core.c:10151)
[ 125.433431][ T1430] ? destroy_cm_id (drivers/infiniband/core/iwcm.c:375) iw_cm
[ 125.441209][ T1430] ? __pfx___flush_workqueue (kernel/workqueue.c:3910)
[ 125.473900][ T1430] ? _raw_spin_lock_irqsave (arch/x86/include/asm/atomic.h:107 include/linux/atomic/atomic-arch-fallback.h:2170 include/linux/atomic/atomic-instrumented.h:1302 include/asm-generic/qspinlock.h:111 include/linux/spinlock.h:187 include/linux/spinlock_api_smp.h:111 kernel/locking/spinlock.c:162)
[ 125.473909][ T1430] ? __pfx__raw_spin_lock_irqsave (kernel/locking/spinlock.c:161)
[ 125.482537][ T1430] _destroy_id (drivers/infiniband/core/cma.c:2044) rdma_cm
[ 125.495072][ T1430] nvme_rdma_free_queue (drivers/nvme/host/rdma.c:656 drivers/nvme/host/rdma.c:650) nvme_rdma
[ 125.505827][ T1430] nvme_rdma_reset_ctrl_work (drivers/nvme/host/rdma.c:2180) nvme_rdma
[ 125.505831][ T1430] process_one_work (kernel/workqueue.c:3231)
[ 125.515122][ T1430] worker_thread (kernel/workqueue.c:3306 kernel/workqueue.c:3393)
[ 125.515127][ T1430] ? __pfx_worker_thread (kernel/workqueue.c:3339)
[ 125.531837][ T1430] kthread (kernel/kthread.c:389)
[ 125.539864][ T1430] ? __pfx_kthread (kernel/kthread.c:342)
[ 125.550628][ T1430] ret_from_fork (arch/x86/kernel/process.c:147)
[ 125.558840][ T1430] ? __pfx_kthread (kernel/kthread.c:342)
[ 125.558844][ T1430] ret_from_fork_asm (arch/x86/entry/entry_64.S:257)
[  125.566487][ T1430]  &lt;/TASK&gt;
[  125.566488][ T1430] ---[ end trace 0000000000000000 ]---</Note>
    </Notes>
    <CVE>CVE-2024-47696</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47696.html</URL>
        <Description>CVE-2024-47696</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231864</URL>
        <Description>SUSE Bug 1231864</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="65">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error

Ensure index in rtl2830_pid_filter does not exceed 31 to prevent
out-of-bounds access.

dev-&gt;filters is a 32-bit value, so set_bit and clear_bit functions should
only operate on indices from 0 to 31. If index is 32, it will attempt to
access a non-existent 33rd bit, leading to out-of-bounds access.
Change the boundary check from index &gt; 32 to index &gt;= 32 to resolve this
issue.</Note>
    </Notes>
    <CVE>CVE-2024-47697</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47697.html</URL>
        <Description>CVE-2024-47697</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231858</URL>
        <Description>SUSE Bug 1231858</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="66">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error

Ensure index in rtl2832_pid_filter does not exceed 31 to prevent
out-of-bounds access.

dev-&gt;filters is a 32-bit value, so set_bit and clear_bit functions should
only operate on indices from 0 to 31. If index is 32, it will attempt to
access a non-existent 33rd bit, leading to out-of-bounds access.
Change the boundary check from index &gt; 32 to index &gt;= 32 to resolve this
issue.

[hverkuil: added fixes tag, rtl2830_pid_filter -&gt; rtl2832_pid_filter in logmsg]</Note>
    </Notes>
    <CVE>CVE-2024-47698</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47698.html</URL>
        <Description>CVE-2024-47698</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231859</URL>
        <Description>SUSE Bug 1231859</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="67">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix potential null-ptr-deref in nilfs_btree_insert()

Patch series "nilfs2: fix potential issues with empty b-tree nodes".

This series addresses three potential issues with empty b-tree nodes that
can occur with corrupted filesystem images, including one recently
discovered by syzbot.


This patch (of 3):

If a b-tree is broken on the device, and the b-tree height is greater than
2 (the level of the root node is greater than 1) even if the number of
child nodes of the b-tree root is 0, a NULL pointer dereference occurs in
nilfs_btree_prepare_insert(), which is called from nilfs_btree_insert().

This is because, when the number of child nodes of the b-tree root is 0,
nilfs_btree_do_lookup() does not set the block buffer head in any of
path[x].bp_bh, leaving it as the initial value of NULL, but if the level
of the b-tree root node is greater than 1, nilfs_btree_get_nonroot_node(),
which accesses the buffer memory of path[x].bp_bh, is called.

Fix this issue by adding a check to nilfs_btree_root_broken(), which
performs sanity checks when reading the root node from the device, to
detect this inconsistency.

Thanks to Lizhi Xu for trying to solve the bug and clarifying the cause
early on.</Note>
    </Notes>
    <CVE>CVE-2024-47699</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47699.html</URL>
        <Description>CVE-2024-47699</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231916</URL>
        <Description>SUSE Bug 1231916</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="68">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid OOB when system.data xattr changes underneath the filesystem

When looking up for an entry in an inlined directory, if e_value_offs is
changed underneath the filesystem by some change in the block device, it
will lead to an out-of-bounds access that KASAN detects as an UAF.

EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
loop0: detected capacity change from 2048 to 2047
==================================================================
BUG: KASAN: use-after-free in ext4_search_dir+0xf2/0x1c0 fs/ext4/namei.c:1500
Read of size 1 at addr ffff88803e91130f by task syz-executor269/5103

CPU: 0 UID: 0 PID: 5103 Comm: syz-executor269 Not tainted 6.11.0-rc4-syzkaller #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:93 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119
 print_address_description mm/kasan/report.c:377 [inline]
 print_report+0x169/0x550 mm/kasan/report.c:488
 kasan_report+0x143/0x180 mm/kasan/report.c:601
 ext4_search_dir+0xf2/0x1c0 fs/ext4/namei.c:1500
 ext4_find_inline_entry+0x4be/0x5e0 fs/ext4/inline.c:1697
 __ext4_find_entry+0x2b4/0x1b30 fs/ext4/namei.c:1573
 ext4_lookup_entry fs/ext4/namei.c:1727 [inline]
 ext4_lookup+0x15f/0x750 fs/ext4/namei.c:1795
 lookup_one_qstr_excl+0x11f/0x260 fs/namei.c:1633
 filename_create+0x297/0x540 fs/namei.c:3980
 do_symlinkat+0xf9/0x3a0 fs/namei.c:4587
 __do_sys_symlinkat fs/namei.c:4610 [inline]
 __se_sys_symlinkat fs/namei.c:4607 [inline]
 __x64_sys_symlinkat+0x95/0xb0 fs/namei.c:4607
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f3e73ced469
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 21 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fff4d40c258 EFLAGS: 00000246 ORIG_RAX: 000000000000010a
RAX: ffffffffffffffda RBX: 0032656c69662f2e RCX: 00007f3e73ced469
RDX: 0000000020000200 RSI: 00000000ffffff9c RDI: 00000000200001c0
RBP: 0000000000000000 R08: 00007fff4d40c290 R09: 00007fff4d40c290
R10: 0023706f6f6c2f76 R11: 0000000000000246 R12: 00007fff4d40c27c
R13: 0000000000000003 R14: 431bde82d7b634db R15: 00007fff4d40c2b0
 &lt;/TASK&gt;

Calling ext4_xattr_ibody_find right after reading the inode with
ext4_get_inode_loc will lead to a check of the validity of the xattrs,
avoiding this problem.</Note>
    </Notes>
    <CVE>CVE-2024-47701</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47701.html</URL>
        <Description>CVE-2024-47701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225742</URL>
        <Description>SUSE Bug 1225742</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231920</URL>
        <Description>SUSE Bug 1231920</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="69">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

can: bcm: Clear bo-&gt;bcm_proc_read after remove_proc_entry().

syzbot reported a warning in bcm_release(). [0]

The blamed change fixed another warning that is triggered when
connect() is issued again for a socket whose connect()ed device has
been unregistered.

However, if the socket is just close()d without the 2nd connect(), the
remaining bo-&gt;bcm_proc_read triggers unnecessary remove_proc_entry()
in bcm_release().

Let's clear bo-&gt;bcm_proc_read after remove_proc_entry() in bcm_notify().

[0]
name '4986'
WARNING: CPU: 0 PID: 5234 at fs/proc/generic.c:711 remove_proc_entry+0x2e7/0x5d0 fs/proc/generic.c:711
Modules linked in:
CPU: 0 UID: 0 PID: 5234 Comm: syz-executor606 Not tainted 6.11.0-rc5-syzkaller-00178-g5517ae241919 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
RIP: 0010:remove_proc_entry+0x2e7/0x5d0 fs/proc/generic.c:711
Code: ff eb 05 e8 cb 1e 5e ff 48 8b 5c 24 10 48 c7 c7 e0 f7 aa 8e e8 2a 38 8e 09 90 48 c7 c7 60 3a 1b 8c 48 89 de e8 da 42 20 ff 90 &lt;0f&gt; 0b 90 90 48 8b 44 24 18 48 c7 44 24 40 0e 36 e0 45 49 c7 04 07
RSP: 0018:ffffc9000345fa20 EFLAGS: 00010246
RAX: 2a2d0aee2eb64600 RBX: ffff888032f1f548 RCX: ffff888029431e00
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc9000345fb08 R08: ffffffff8155b2f2 R09: 1ffff1101710519a
R10: dffffc0000000000 R11: ffffed101710519b R12: ffff888011d38640
R13: 0000000000000004 R14: 0000000000000000 R15: dffffc0000000000
FS:  0000000000000000(0000) GS:ffff8880b8800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fcfb52722f0 CR3: 000000000e734000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 bcm_release+0x250/0x880 net/can/bcm.c:1578
 __sock_release net/socket.c:659 [inline]
 sock_close+0xbc/0x240 net/socket.c:1421
 __fput+0x24a/0x8a0 fs/file_table.c:422
 task_work_run+0x24f/0x310 kernel/task_work.c:228
 exit_task_work include/linux/task_work.h:40 [inline]
 do_exit+0xa2f/0x27f0 kernel/exit.c:882
 do_group_exit+0x207/0x2c0 kernel/exit.c:1031
 __do_sys_exit_group kernel/exit.c:1042 [inline]
 __se_sys_exit_group kernel/exit.c:1040 [inline]
 __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1040
 x64_sys_call+0x2634/0x2640 arch/x86/include/generated/asm/syscalls_64.h:232
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fcfb51ee969
Code: Unable to access opcode bytes at 0x7fcfb51ee93f.
RSP: 002b:00007ffce0109ca8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007fcfb51ee969
RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001
RBP: 00007fcfb526f3b0 R08: ffffffffffffffb8 R09: 0000555500000000
R10: 0000555500000000 R11: 0000000000000246 R12: 00007fcfb526f3b0
R13: 0000000000000000 R14: 00007fcfb5271ee0 R15: 00007fcfb51bf160
 &lt;/TASK&gt;</Note>
    </Notes>
    <CVE>CVE-2024-47709</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47709.html</URL>
        <Description>CVE-2024-47709</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232048</URL>
        <Description>SUSE Bug 1232048</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="70">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: wilc1000: fix potential RCU dereference issue in wilc_parse_join_bss_param

In the `wilc_parse_join_bss_param` function, the TSF field of the `ies`
structure is accessed after the RCU read-side critical section is
unlocked. According to RCU usage rules, this is illegal. Reusing this
pointer can lead to unpredictable behavior, including accessing memory
that has been updated or causing use-after-free issues.

This possible bug was identified using a static analysis tool developed
by myself, specifically designed to detect RCU-related issues.

To address this, the TSF value is now stored in a local variable
`ies_tsf` before the RCU lock is released. The `param-&gt;tsf_lo` field is
then assigned using this local variable, ensuring that the TSF value is
safely accessed.</Note>
    </Notes>
    <CVE>CVE-2024-47712</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47712.html</URL>
        <Description>CVE-2024-47712</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232017</URL>
        <Description>SUSE Bug 1232017</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="71">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop()

Since '__dev_queue_xmit()' should be called with interrupts enabled,
the following backtrace:

ieee80211_do_stop()
 ...
 spin_lock_irqsave(&amp;local-&gt;queue_stop_reason_lock, flags)
 ...
 ieee80211_free_txskb()
  ieee80211_report_used_skb()
   ieee80211_report_ack_skb()
    cfg80211_mgmt_tx_status_ext()
     nl80211_frame_tx_status()
      genlmsg_multicast_netns()
       genlmsg_multicast_netns_filtered()
        nlmsg_multicast_filtered()
	 netlink_broadcast_filtered()
	  do_one_broadcast()
	   netlink_broadcast_deliver()
	    __netlink_sendskb()
	     netlink_deliver_tap()
	      __netlink_deliver_tap_skb()
	       dev_queue_xmit()
	        __dev_queue_xmit() ; with IRQS disabled
 ...
 spin_unlock_irqrestore(&amp;local-&gt;queue_stop_reason_lock, flags)

issues the warning (as reported by syzbot reproducer):

WARNING: CPU: 2 PID: 5128 at kernel/softirq.c:362 __local_bh_enable_ip+0xc3/0x120

Fix this by implementing a two-phase skb reclamation in
'ieee80211_do_stop()', where actual work is performed
outside of a section with interrupts disabled.</Note>
    </Notes>
    <CVE>CVE-2024-47713</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47713.html</URL>
        <Description>CVE-2024-47713</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232016</URL>
        <Description>SUSE Bug 1232016</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="72">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw88: always wait for both firmware loading attempts

In 'rtw_wait_firmware_completion()', always wait for both (regular and
wowlan) firmware loading attempts. Otherwise if 'rtw_usb_intf_init()'
has failed in 'rtw_usb_probe()', 'rtw_usb_disconnect()' may issue
'ieee80211_free_hw()' when one of 'rtw_load_firmware_cb()' (usually
the wowlan one) is still in progress, causing UAF detected by KASAN.</Note>
    </Notes>
    <CVE>CVE-2024-47718</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47718.html</URL>
        <Description>CVE-2024-47718</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232015</URL>
        <Description>SUSE Bug 1232015</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="73">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

jfs: fix out-of-bounds in dbNextAG() and diAlloc()

In dbNextAG() , there is no check for the case where bmp-&gt;db_numag is
greater or same than MAXAG due to a polluted image, which causes an
out-of-bounds. Therefore, a bounds check should be added in dbMount().

And in dbNextAG(), a check for the case where agpref is greater than
bmp-&gt;db_numag should be added, so an out-of-bounds exception should be
prevented.

Additionally, a check for the case where agno is greater or same than
MAXAG should be added in diAlloc() to prevent out-of-bounds.</Note>
    </Notes>
    <CVE>CVE-2024-47723</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47723.html</URL>
        <Description>CVE-2024-47723</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232050</URL>
        <Description>SUSE Bug 1232050</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232051</URL>
        <Description>SUSE Bug 1232051</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="74">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error

For all non-tracing helpers which formerly had ARG_PTR_TO_{LONG,INT} as input
arguments, zero the value for the case of an error as otherwise it could leak
memory. For tracing, it is not needed given CAP_PERFMON can already read all
kernel memory anyway hence bpf_get_func_arg() and bpf_get_func_ret() is skipped
in here.

Also, the MTU helpers mtu_len pointer value is being written but also read.
Technically, the MEM_UNINIT should not be there in order to always force init.
Removing MEM_UNINIT needs more verifier rework though: MEM_UNINIT right now
implies two things actually: i) write into memory, ii) memory does not have
to be initialized. If we lift MEM_UNINIT, it then becomes: i) read into memory,
ii) memory must be initialized. This means that for bpf_*_check_mtu() we're
readding the issue we're trying to fix, that is, it would then be able to
write back into things like .rodata BPF maps. Follow-up work will rework the
MEM_UNINIT semantics such that the intent can be better expressed. For now
just clear the *mtu_len on error path which can be lifted later again.</Note>
    </Notes>
    <CVE>CVE-2024-47728</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47728.html</URL>
        <Description>CVE-2024-47728</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232076</URL>
        <Description>SUSE Bug 1232076</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="75">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled

Fix missuse of spin_lock_irq()/spin_unlock_irq() when
spin_lock_irqsave()/spin_lock_irqrestore() was hold.

This was discovered through the lock debugging, and the corresponding
log is as follows:

raw_local_irq_restore() called with IRQs enabled
WARNING: CPU: 96 PID: 2074 at kernel/locking/irqflag-debug.c:10 warn_bogus_irq_restore+0x30/0x40
...
Call trace:
 warn_bogus_irq_restore+0x30/0x40
 _raw_spin_unlock_irqrestore+0x84/0xc8
 add_qp_to_list+0x11c/0x148 [hns_roce_hw_v2]
 hns_roce_create_qp_common.constprop.0+0x240/0x780 [hns_roce_hw_v2]
 hns_roce_create_qp+0x98/0x160 [hns_roce_hw_v2]
 create_qp+0x138/0x258
 ib_create_qp_kernel+0x50/0xe8
 create_mad_qp+0xa8/0x128
 ib_mad_port_open+0x218/0x448
 ib_mad_init_device+0x70/0x1f8
 add_client_context+0xfc/0x220
 enable_device_and_get+0xd0/0x140
 ib_register_device.part.0+0xf4/0x1c8
 ib_register_device+0x34/0x50
 hns_roce_register_device+0x174/0x3d0 [hns_roce_hw_v2]
 hns_roce_init+0xfc/0x2c0 [hns_roce_hw_v2]
 __hns_roce_hw_v2_init_instance+0x7c/0x1d0 [hns_roce_hw_v2]
 hns_roce_hw_v2_init_instance+0x9c/0x180 [hns_roce_hw_v2]</Note>
    </Notes>
    <CVE>CVE-2024-47735</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47735.html</URL>
        <Description>CVE-2024-47735</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232111</URL>
        <Description>SUSE Bug 1232111</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="76">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nfsd: call cache_put if xdr_reserve_space returns NULL

If not enough buffer space available, but idmap_lookup has triggered
lookup_fn which calls cache_get and returns successfully. Then we
missed to call cache_put here which pairs with cache_get.

Reviwed-by: Jeff Layton &lt;jlayton@kernel.org&gt;</Note>
    </Notes>
    <CVE>CVE-2024-47737</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47737.html</URL>
        <Description>CVE-2024-47737</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232056</URL>
        <Description>SUSE Bug 1232056</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="77">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

firmware_loader: Block path traversal

Most firmware names are hardcoded strings, or are constructed from fairly
constrained format strings where the dynamic parts are just some hex
numbers or such.

However, there are a couple codepaths in the kernel where firmware file
names contain string components that are passed through from a device or
semi-privileged userspace; the ones I could find (not counting interfaces
that require root privileges) are:

 - lpfc_sli4_request_firmware_update() seems to construct the firmware
   filename from "ModelName", a string that was previously parsed out of
   some descriptor ("Vital Product Data") in lpfc_fill_vpd()
 - nfp_net_fw_find() seems to construct a firmware filename from a model
   name coming from nfp_hwinfo_lookup(pf-&gt;hwinfo, "nffw.partno"), which I
   think parses some descriptor that was read from the device.
   (But this case likely isn't exploitable because the format string looks
   like "netronome/nic_%s", and there shouldn't be any *folders* starting
   with "netronome/nic_". The previous case was different because there,
   the "%s" is *at the start* of the format string.)
 - module_flash_fw_schedule() is reachable from the
   ETHTOOL_MSG_MODULE_FW_FLASH_ACT netlink command, which is marked as
   GENL_UNS_ADMIN_PERM (meaning CAP_NET_ADMIN inside a user namespace is
   enough to pass the privilege check), and takes a userspace-provided
   firmware name.
   (But I think to reach this case, you need to have CAP_NET_ADMIN over a
   network namespace that a special kind of ethernet device is mapped into,
   so I think this is not a viable attack path in practice.)

Fix it by rejecting any firmware names containing ".." path components.

For what it's worth, I went looking and haven't found any USB device
drivers that use the firmware loader dangerously.</Note>
    </Notes>
    <CVE>CVE-2024-47742</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47742.html</URL>
        <Description>CVE-2024-47742</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232126</URL>
        <Description>SUSE Bug 1232126</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="78">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mm: call the security_mmap_file() LSM hook in remap_file_pages()

The remap_file_pages syscall handler calls do_mmap() directly, which
doesn't contain the LSM security check. And if the process has called
personality(READ_IMPLIES_EXEC) before and remap_file_pages() is called for
RW pages, this will actually result in remapping the pages to RWX,
bypassing a W^X policy enforced by SELinux.

So we should check prot by security_mmap_file LSM hook in the
remap_file_pages syscall handler before do_mmap() is called. Otherwise, it
potentially permits an attacker to bypass a W^X policy enforced by
SELinux.

The bypass is similar to CVE-2016-10044, which bypass the same thing via
AIO and can be found in [1].

The PoC:

$ cat &gt; test.c

int main(void) {
	size_t pagesz = sysconf(_SC_PAGE_SIZE);
	int mfd = syscall(SYS_memfd_create, "test", 0);
	const char *buf = mmap(NULL, 4 * pagesz, PROT_READ | PROT_WRITE,
		MAP_SHARED, mfd, 0);
	unsigned int old = syscall(SYS_personality, 0xffffffff);
	syscall(SYS_personality, READ_IMPLIES_EXEC | old);
	syscall(SYS_remap_file_pages, buf, pagesz, 0, 2, 0);
	syscall(SYS_personality, old);
	// show the RWX page exists even if W^X policy is enforced
	int fd = open("/proc/self/maps", O_RDONLY);
	unsigned char buf2[1024];
	while (1) {
		int ret = read(fd, buf2, 1024);
		if (ret &lt;= 0) break;
		write(1, buf2, ret);
	}
	close(fd);
}

$ gcc test.c -o test
$ ./test | grep rwx
7f1836c34000-7f1836c35000 rwxs 00002000 00:01 2050 /memfd:test (deleted)

[PM: subject line tweaks]</Note>
    </Notes>
    <CVE>CVE-2024-47745</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47745.html</URL>
        <Description>CVE-2024-47745</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232135</URL>
        <Description>SUSE Bug 1232135</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="79">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/cxgb4: Added NULL check for lookup_atid

The lookup_atid() function can return NULL if the ATID is
invalid or does not exist in the identifier table, which
could lead to dereferencing a null pointer without a
check in the `act_establish()` and `act_open_rpl()` functions.
Add a NULL check to prevent null pointer dereferencing.

Found by Linux Verification Center (linuxtesting.org) with SVACE.</Note>
    </Notes>
    <CVE>CVE-2024-47749</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47749.html</URL>
        <Description>CVE-2024-47749</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232180</URL>
        <Description>SUSE Bug 1232180</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="80">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

PCI: keystone: Fix if-statement expression in ks_pcie_quirk()

This code accidentally uses &amp;&amp; where || was intended.  It potentially
results in a NULL dereference.

Thus, fix the if-statement expression to use the correct condition.

[kwilczynski: commit log]</Note>
    </Notes>
    <CVE>CVE-2024-47756</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47756.html</URL>
        <Description>CVE-2024-47756</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232185</URL>
        <Description>SUSE Bug 1232185</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="81">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix potential oob read in nilfs_btree_check_delete()

The function nilfs_btree_check_delete(), which checks whether degeneration
to direct mapping occurs before deleting a b-tree entry, causes memory
access outside the block buffer when retrieving the maximum key if the
root node has no entries.

This does not usually happen because b-tree mappings with 0 child nodes
are never created by mkfs.nilfs2 or nilfs2 itself.  However, it can happen
if the b-tree root node read from a device is configured that way, so fix
this potential issue by adding a check for that case.</Note>
    </Notes>
    <CVE>CVE-2024-47757</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47757.html</URL>
        <Description>CVE-2024-47757</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232187</URL>
        <Description>SUSE Bug 1232187</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232188</URL>
        <Description>SUSE Bug 1232188</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="82">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos

In case of malformed relocation record of kind BPF_CORE_TYPE_ID_LOCAL
referencing a non-existing BTF type, function bpf_core_calc_relo_insn
would cause a null pointer deference.

Fix this by adding a proper check upper in call stack, as malformed
relocation records could be passed from user space.

Simplest reproducer is a program:

    r0 = 0
    exit

With a single relocation record:

    .insn_off = 0,          /* patch first instruction */
    .type_id = 100500,      /* this type id does not exist */
    .access_str_off = 6,    /* offset of string "0" */
    .kind = BPF_CORE_TYPE_ID_LOCAL,

See the link for original reproducer or next commit for a test case.</Note>
    </Notes>
    <CVE>CVE-2024-49850</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49850.html</URL>
        <Description>CVE-2024-49850</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232189</URL>
        <Description>SUSE Bug 1232189</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="83">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tpm: Clean up TPM space after command failure

tpm_dev_transmit prepares the TPM space before attempting command
transmission. However if the command fails no rollback of this
preparation is done. This can result in transient handles being leaked
if the device is subsequently closed with no further commands performed.

Fix this by flushing the space in the event of command transmission
failure.</Note>
    </Notes>
    <CVE>CVE-2024-49851</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49851.html</URL>
        <Description>CVE-2024-49851</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232134</URL>
        <Description>SUSE Bug 1232134</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="84">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del()

The kref_put() function will call nport-&gt;release if the refcount drops to
zero.  The nport-&gt;release release function is _efc_nport_free() which frees
"nport".  But then we dereference "nport" on the next line which is a use
after free.  Re-order these lines to avoid the use after free.</Note>
    </Notes>
    <CVE>CVE-2024-49852</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49852.html</URL>
        <Description>CVE-2024-49852</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232819</URL>
        <Description>SUSE Bug 1232819</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="85">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nbd: fix race between timeout and normal completion

If request timetout is handled by nbd_requeue_cmd(), normal completion
has to be stopped for avoiding to complete this requeued request, other
use-after-free can be triggered.

Fix the race by clearing NBD_CMD_INFLIGHT in nbd_requeue_cmd(), meantime
make sure that cmd-&gt;lock is grabbed for clearing the flag and the
requeue.</Note>
    </Notes>
    <CVE>CVE-2024-49855</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49855.html</URL>
        <Description>CVE-2024-49855</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232195</URL>
        <Description>SUSE Bug 1232195</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232900</URL>
        <Description>SUSE Bug 1232900</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="86">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix helper writes to read-only maps

Lonial found an issue that despite user- and BPF-side frozen BPF map
(like in case of .rodata), it was still possible to write into it from
a BPF program side through specific helpers having ARG_PTR_TO_{LONG,INT}
as arguments.

In check_func_arg() when the argument is as mentioned, the meta-&gt;raw_mode
is never set. Later, check_helper_mem_access(), under the case of
PTR_TO_MAP_VALUE as register base type, it assumes BPF_READ for the
subsequent call to check_map_access_type() and given the BPF map is
read-only it succeeds.

The helpers really need to be annotated as ARG_PTR_TO_{LONG,INT} | MEM_UNINIT
when results are written into them as opposed to read out of them. The
latter indicates that it's okay to pass a pointer to uninitialized memory
as the memory is written to anyway.

However, ARG_PTR_TO_{LONG,INT} is a special case of ARG_PTR_TO_FIXED_SIZE_MEM
just with additional alignment requirement. So it is better to just get
rid of the ARG_PTR_TO_{LONG,INT} special cases altogether and reuse the
fixed size memory types. For this, add MEM_ALIGNED to additionally ensure
alignment given these helpers write directly into the args via *&lt;ptr&gt; = val.
The .arg*_size has been initialized reflecting the actual sizeof(*&lt;ptr&gt;).

MEM_ALIGNED can only be used in combination with MEM_FIXED_SIZE annotated
argument types, since in !MEM_FIXED_SIZE cases the verifier does not know
the buffer size a priori and therefore cannot blindly write *&lt;ptr&gt; = val.</Note>
    </Notes>
    <CVE>CVE-2024-49861</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49861.html</URL>
        <Description>CVE-2024-49861</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232254</URL>
        <Description>SUSE Bug 1232254</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="87">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

vhost/scsi: null-ptr-dereference in vhost_scsi_get_req()

Since commit 3f8ca2e115e5 ("vhost/scsi: Extract common handling code
from control queue handler") a null pointer dereference bug can be
triggered when guest sends an SCSI AN request.

In vhost_scsi_ctl_handle_vq(), `vc.target` is assigned with
`&amp;v_req.tmf.lun[1]` within a switch-case block and is then passed to
vhost_scsi_get_req() which extracts `vc-&gt;req` and `tpg`. However, for
a `VIRTIO_SCSI_T_AN_*` request, tpg is not required, so `vc.target` is
set to NULL in this branch. Later, in vhost_scsi_get_req(),
`vc-&gt;target` is dereferenced without being checked, leading to a null
pointer dereference bug. This bug can be triggered from guest.

When this bug occurs, the vhost_worker process is killed while holding
`vq-&gt;mutex` and the corresponding tpg will remain occupied
indefinitely.

Below is the KASAN report:
Oops: general protection fault, probably for non-canonical address
0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
CPU: 1 PID: 840 Comm: poc Not tainted 6.10.0+ #1
Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS
1.16.3-debian-1.16.3-2 04/01/2014
RIP: 0010:vhost_scsi_get_req+0x165/0x3a0
Code: 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 2b 02 00 00
48 b8 00 00 00 00 00 fc ff df 4d 8b 65 30 4c 89 e2 48 c1 ea 03 &lt;0f&gt; b6
04 02 4c 89 e2 83 e2 07 38 d0 7f 08 84 c0 0f 85 be 01 00 00
RSP: 0018:ffff888017affb50 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: ffff88801b000000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff888017affcb8
RBP: ffff888017affb80 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: ffff888017affc88 R14: ffff888017affd1c R15: ffff888017993000
FS:  000055556e076500(0000) GS:ffff88806b100000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000200027c0 CR3: 0000000010ed0004 CR4: 0000000000370ef0
Call Trace:
 &lt;TASK&gt;
 ? show_regs+0x86/0xa0
 ? die_addr+0x4b/0xd0
 ? exc_general_protection+0x163/0x260
 ? asm_exc_general_protection+0x27/0x30
 ? vhost_scsi_get_req+0x165/0x3a0
 vhost_scsi_ctl_handle_vq+0x2a4/0xca0
 ? __pfx_vhost_scsi_ctl_handle_vq+0x10/0x10
 ? __switch_to+0x721/0xeb0
 ? __schedule+0xda5/0x5710
 ? __kasan_check_write+0x14/0x30
 ? _raw_spin_lock+0x82/0xf0
 vhost_scsi_ctl_handle_kick+0x52/0x90
 vhost_run_work_list+0x134/0x1b0
 vhost_task_fn+0x121/0x350
...
 &lt;/TASK&gt;
---[ end trace 0000000000000000 ]---

Let's add a check in vhost_scsi_get_req.

[whitespace fixes]</Note>
    </Notes>
    <CVE>CVE-2024-49863</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49863.html</URL>
        <Description>CVE-2024-49863</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232255</URL>
        <Description>SUSE Bug 1232255</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="88">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix a NULL pointer dereference when failed to start a new trasacntion

[BUG]
Syzbot reported a NULL pointer dereference with the following crash:

  FAULT_INJECTION: forcing a failure.
   start_transaction+0x830/0x1670 fs/btrfs/transaction.c:676
   prepare_to_relocate+0x31f/0x4c0 fs/btrfs/relocation.c:3642
   relocate_block_group+0x169/0xd20 fs/btrfs/relocation.c:3678
  ...
  BTRFS info (device loop0): balance: ended with status: -12
  Oops: general protection fault, probably for non-canonical address 0xdffffc00000000cc: 0000 [#1] PREEMPT SMP KASAN NOPTI
  KASAN: null-ptr-deref in range [0x0000000000000660-0x0000000000000667]
  RIP: 0010:btrfs_update_reloc_root+0x362/0xa80 fs/btrfs/relocation.c:926
  Call Trace:
   &lt;TASK&gt;
   commit_fs_roots+0x2ee/0x720 fs/btrfs/transaction.c:1496
   btrfs_commit_transaction+0xfaf/0x3740 fs/btrfs/transaction.c:2430
   del_balance_item fs/btrfs/volumes.c:3678 [inline]
   reset_balance_state+0x25e/0x3c0 fs/btrfs/volumes.c:3742
   btrfs_balance+0xead/0x10c0 fs/btrfs/volumes.c:4574
   btrfs_ioctl_balance+0x493/0x7c0 fs/btrfs/ioctl.c:3673
   vfs_ioctl fs/ioctl.c:51 [inline]
   __do_sys_ioctl fs/ioctl.c:907 [inline]
   __se_sys_ioctl+0xf9/0x170 fs/ioctl.c:893
   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
   do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

[CAUSE]
The allocation failure happens at the start_transaction() inside
prepare_to_relocate(), and during the error handling we call
unset_reloc_control(), which makes fs_info-&gt;balance_ctl to be NULL.

Then we continue the error path cleanup in btrfs_balance() by calling
reset_balance_state() which will call del_balance_item() to fully delete
the balance item in the root tree.

However during the small window between set_reloc_contrl() and
unset_reloc_control(), we can have a subvolume tree update and created a
reloc_root for that subvolume.

Then we go into the final btrfs_commit_transaction() of
del_balance_item(), and into btrfs_update_reloc_root() inside
commit_fs_roots().

That function checks if fs_info-&gt;reloc_ctl is in the merge_reloc_tree
stage, but since fs_info-&gt;reloc_ctl is NULL, it results a NULL pointer
dereference.

[FIX]
Just add extra check on fs_info-&gt;reloc_ctl inside
btrfs_update_reloc_root(), before checking
fs_info-&gt;reloc_ctl-&gt;merge_reloc_tree.

That DEAD_RELOC_TREE handling is to prevent further modification to the
reloc tree during merge stage, but since there is no reloc_ctl at all,
we do not need to bother that.</Note>
    </Notes>
    <CVE>CVE-2024-49868</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49868.html</URL>
        <Description>CVE-2024-49868</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232272</URL>
        <Description>SUSE Bug 1232272</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="89">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

cachefiles: fix dentry leak in cachefiles_open_file()

A dentry leak may be caused when a lookup cookie and a cull are concurrent:

            P1             |             P2
-----------------------------------------------------------
cachefiles_lookup_cookie
  cachefiles_look_up_object
    lookup_one_positive_unlocked
     // get dentry
                            cachefiles_cull
                              inode-&gt;i_flags |= S_KERNEL_FILE;
    cachefiles_open_file
      cachefiles_mark_inode_in_use
        __cachefiles_mark_inode_in_use
          can_use = false
          if (!(inode-&gt;i_flags &amp; S_KERNEL_FILE))
            can_use = true
	  return false
        return false
        // Returns an error but doesn't put dentry

After that the following WARNING will be triggered when the backend folder
is umounted:

==================================================================
BUG: Dentry 000000008ad87947{i=7a,n=Dx_1_1.img}  still in use (1) [unmount of ext4 sda]
WARNING: CPU: 4 PID: 359261 at fs/dcache.c:1767 umount_check+0x5d/0x70
CPU: 4 PID: 359261 Comm: umount Not tainted 6.6.0-dirty #25
RIP: 0010:umount_check+0x5d/0x70
Call Trace:
 &lt;TASK&gt;
 d_walk+0xda/0x2b0
 do_one_tree+0x20/0x40
 shrink_dcache_for_umount+0x2c/0x90
 generic_shutdown_super+0x20/0x160
 kill_block_super+0x1a/0x40
 ext4_kill_sb+0x22/0x40
 deactivate_locked_super+0x35/0x80
 cleanup_mnt+0x104/0x160
==================================================================

Whether cachefiles_open_file() returns true or false, the reference count
obtained by lookup_positive_unlocked() in cachefiles_look_up_object()
should be released.

Therefore release that reference count in cachefiles_look_up_object() to
fix the above issue and simplify the code.</Note>
    </Notes>
    <CVE>CVE-2024-49870</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49870.html</URL>
        <Description>CVE-2024-49870</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232279</URL>
        <Description>SUSE Bug 1232279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="90">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Input: adp5589-keys - fix NULL pointer dereference

We register a devm action to call adp5589_clear_config() and then pass
the i2c client as argument so that we can call i2c_get_clientdata() in
order to get our device object. However, i2c_set_clientdata() is only
being set at the end of the probe function which means that we'll get a
NULL pointer dereference in case the probe function fails early.</Note>
    </Notes>
    <CVE>CVE-2024-49871</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49871.html</URL>
        <Description>CVE-2024-49871</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232287</URL>
        <Description>SUSE Bug 1232287</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="91">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nfsd: map the EBADMSG to nfserr_io to avoid warning

Ext4 will throw -EBADMSG through ext4_readdir when a checksum error
occurs, resulting in the following WARNING.

Fix it by mapping EBADMSG to nfserr_io.

nfsd_buffered_readdir
 iterate_dir // -EBADMSG -74
  ext4_readdir // .iterate_shared
   ext4_dx_readdir
    ext4_htree_fill_tree
     htree_dirblock_to_tree
      ext4_read_dirblock
       __ext4_read_dirblock
        ext4_dirblock_csum_verify
         warn_no_space_for_csum
          __warn_no_space_for_csum
        return ERR_PTR(-EFSBADCRC) // -EBADMSG -74
 nfserrno // WARNING

[  161.115610] ------------[ cut here ]------------
[  161.116465] nfsd: non-standard errno: -74
[  161.117315] WARNING: CPU: 1 PID: 780 at fs/nfsd/nfsproc.c:878 nfserrno+0x9d/0xd0
[  161.118596] Modules linked in:
[  161.119243] CPU: 1 PID: 780 Comm: nfsd Not tainted 5.10.0-00014-g79679361fd5d #138
[  161.120684] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qe
mu.org 04/01/2014
[  161.123601] RIP: 0010:nfserrno+0x9d/0xd0
[  161.124676] Code: 0f 87 da 30 dd 00 83 e3 01 b8 00 00 00 05 75 d7 44 89 ee 48 c7 c7 c0 57 24 98 89 44 24 04 c6
 05 ce 2b 61 03 01 e8 99 20 d8 00 &lt;0f&gt; 0b 8b 44 24 04 eb b5 4c 89 e6 48 c7 c7 a0 6d a4 99 e8 cc 15 33
[  161.127797] RSP: 0018:ffffc90000e2f9c0 EFLAGS: 00010286
[  161.128794] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
[  161.130089] RDX: 1ffff1103ee16f6d RSI: 0000000000000008 RDI: fffff520001c5f2a
[  161.131379] RBP: 0000000000000022 R08: 0000000000000001 R09: ffff8881f70c1827
[  161.132664] R10: ffffed103ee18304 R11: 0000000000000001 R12: 0000000000000021
[  161.133949] R13: 00000000ffffffb6 R14: ffff8881317c0000 R15: ffffc90000e2fbd8
[  161.135244] FS:  0000000000000000(0000) GS:ffff8881f7080000(0000) knlGS:0000000000000000
[  161.136695] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  161.137761] CR2: 00007fcaad70b348 CR3: 0000000144256006 CR4: 0000000000770ee0
[  161.139041] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  161.140291] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  161.141519] PKRU: 55555554
[  161.142076] Call Trace:
[  161.142575]  ? __warn+0x9b/0x140
[  161.143229]  ? nfserrno+0x9d/0xd0
[  161.143872]  ? report_bug+0x125/0x150
[  161.144595]  ? handle_bug+0x41/0x90
[  161.145284]  ? exc_invalid_op+0x14/0x70
[  161.146009]  ? asm_exc_invalid_op+0x12/0x20
[  161.146816]  ? nfserrno+0x9d/0xd0
[  161.147487]  nfsd_buffered_readdir+0x28b/0x2b0
[  161.148333]  ? nfsd4_encode_dirent_fattr+0x380/0x380
[  161.149258]  ? nfsd_buffered_filldir+0xf0/0xf0
[  161.150093]  ? wait_for_concurrent_writes+0x170/0x170
[  161.151004]  ? generic_file_llseek_size+0x48/0x160
[  161.151895]  nfsd_readdir+0x132/0x190
[  161.152606]  ? nfsd4_encode_dirent_fattr+0x380/0x380
[  161.153516]  ? nfsd_unlink+0x380/0x380
[  161.154256]  ? override_creds+0x45/0x60
[  161.155006]  nfsd4_encode_readdir+0x21a/0x3d0
[  161.155850]  ? nfsd4_encode_readlink+0x210/0x210
[  161.156731]  ? write_bytes_to_xdr_buf+0x97/0xe0
[  161.157598]  ? __write_bytes_to_xdr_buf+0xd0/0xd0
[  161.158494]  ? lock_downgrade+0x90/0x90
[  161.159232]  ? nfs4svc_decode_voidarg+0x10/0x10
[  161.160092]  nfsd4_encode_operation+0x15a/0x440
[  161.160959]  nfsd4_proc_compound+0x718/0xe90
[  161.161818]  nfsd_dispatch+0x18e/0x2c0
[  161.162586]  svc_process_common+0x786/0xc50
[  161.163403]  ? nfsd_svc+0x380/0x380
[  161.164137]  ? svc_printk+0x160/0x160
[  161.164846]  ? svc_xprt_do_enqueue.part.0+0x365/0x380
[  161.165808]  ? nfsd_svc+0x380/0x380
[  161.166523]  ? rcu_is_watching+0x23/0x40
[  161.167309]  svc_process+0x1a5/0x200
[  161.168019]  nfsd+0x1f5/0x380
[  161.168663]  ? nfsd_shutdown_threads+0x260/0x260
[  161.169554]  kthread+0x1c4/0x210
[  161.170224]  ? kthread_insert_work_sanity_check+0x80/0x80
[  161.171246]  ret_from_fork+0x1f/0x30</Note>
    </Notes>
    <CVE>CVE-2024-49875</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49875.html</URL>
        <Description>CVE-2024-49875</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232333</URL>
        <Description>SUSE Bug 1232333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="92">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate

When doing cleanup, if flags without OCFS2_BH_READAHEAD, it may trigger
NULL pointer dereference in the following ocfs2_set_buffer_uptodate() if
bh is NULL.</Note>
    </Notes>
    <CVE>CVE-2024-49877</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49877.html</URL>
        <Description>CVE-2024-49877</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232339</URL>
        <Description>SUSE Bug 1232339</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="93">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm: omapdrm: Add missing check for alloc_ordered_workqueue

As it may return NULL pointer and cause NULL pointer dereference. Add check
for the return value of alloc_ordered_workqueue.</Note>
    </Notes>
    <CVE>CVE-2024-49879</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49879.html</URL>
        <Description>CVE-2024-49879</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232349</URL>
        <Description>SUSE Bug 1232349</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="94">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ext4: fix slab-use-after-free in ext4_split_extent_at()

We hit the following use-after-free:

==================================================================
BUG: KASAN: slab-use-after-free in ext4_split_extent_at+0xba8/0xcc0
Read of size 2 at addr ffff88810548ed08 by task kworker/u20:0/40
CPU: 0 PID: 40 Comm: kworker/u20:0 Not tainted 6.9.0-dirty #724
Call Trace:
 &lt;TASK&gt;
 kasan_report+0x93/0xc0
 ext4_split_extent_at+0xba8/0xcc0
 ext4_split_extent.isra.0+0x18f/0x500
 ext4_split_convert_extents+0x275/0x750
 ext4_ext_handle_unwritten_extents+0x73e/0x1580
 ext4_ext_map_blocks+0xe20/0x2dc0
 ext4_map_blocks+0x724/0x1700
 ext4_do_writepages+0x12d6/0x2a70
[...]

Allocated by task 40:
 __kmalloc_noprof+0x1ac/0x480
 ext4_find_extent+0xf3b/0x1e70
 ext4_ext_map_blocks+0x188/0x2dc0
 ext4_map_blocks+0x724/0x1700
 ext4_do_writepages+0x12d6/0x2a70
[...]

Freed by task 40:
 kfree+0xf1/0x2b0
 ext4_find_extent+0xa71/0x1e70
 ext4_ext_insert_extent+0xa22/0x3260
 ext4_split_extent_at+0x3ef/0xcc0
 ext4_split_extent.isra.0+0x18f/0x500
 ext4_split_convert_extents+0x275/0x750
 ext4_ext_handle_unwritten_extents+0x73e/0x1580
 ext4_ext_map_blocks+0xe20/0x2dc0
 ext4_map_blocks+0x724/0x1700
 ext4_do_writepages+0x12d6/0x2a70
[...]
==================================================================

The flow of issue triggering is as follows:

ext4_split_extent_at
  path = *ppath
  ext4_ext_insert_extent(ppath)
    ext4_ext_create_new_leaf(ppath)
      ext4_find_extent(orig_path)
        path = *orig_path
        read_extent_tree_block
          // return -ENOMEM or -EIO
        ext4_free_ext_path(path)
          kfree(path)
        *orig_path = NULL
  a. If err is -ENOMEM:
  ext4_ext_dirty(path + path-&gt;p_depth)
  // path use-after-free !!!
  b. If err is -EIO and we have EXT_DEBUG defined:
  ext4_ext_show_leaf(path)
    eh = path[depth].p_hdr
    // path also use-after-free !!!

So when trying to zeroout or fix the extent length, call ext4_find_extent()
to update the path.

In addition we use *ppath directly as an ext4_ext_show_leaf() input to
avoid possible use-after-free when EXT_DEBUG is defined, and to avoid
unnecessary path updates.</Note>
    </Notes>
    <CVE>CVE-2024-49884</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49884.html</URL>
        <Description>CVE-2024-49884</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225742</URL>
        <Description>SUSE Bug 1225742</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232198</URL>
        <Description>SUSE Bug 1232198</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="95">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths

When the HBA is undergoing a reset or is handling an errata event, NULL ptr
dereference crashes may occur in routines such as
lpfc_sli_flush_io_rings(), lpfc_dev_loss_tmo_callbk(), or
lpfc_abort_handler().

Add NULL ptr checks before dereferencing hdwq pointers that may have been
freed due to operations colliding with a reset or errata event handler.</Note>
    </Notes>
    <CVE>CVE-2024-49891</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49891.html</URL>
        <Description>CVE-2024-49891</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232218</URL>
        <Description>SUSE Bug 1232218</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="96">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

jfs: Fix uninit-value access of new_ea in ea_buffer

syzbot reports that lzo1x_1_do_compress is using uninit-value:

=====================================================
BUG: KMSAN: uninit-value in lzo1x_1_do_compress+0x19f9/0x2510 lib/lzo/lzo1x_compress.c:178

...

Uninit was stored to memory at:
 ea_put fs/jfs/xattr.c:639 [inline]

...

Local variable ea_buf created at:
 __jfs_setxattr+0x5d/0x1ae0 fs/jfs/xattr.c:662
 __jfs_xattr_set+0xe6/0x1f0 fs/jfs/xattr.c:934

=====================================================

The reason is ea_buf-&gt;new_ea is not initialized properly.

Fix this by using memset to empty its content at the beginning
in ea_get().</Note>
    </Notes>
    <CVE>CVE-2024-49900</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49900.html</URL>
        <Description>CVE-2024-49900</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232359</URL>
        <Description>SUSE Bug 1232359</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="97">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

jfs: check if leafidx greater than num leaves per dmap tree

syzbot report a out of bounds in dbSplit, it because dmt_leafidx greater
than num leaves per dmap tree, add a checking for dmt_leafidx in dbFindLeaf.

Shaggy:
Modified sanity check to apply to control pages as well as leaf pages.</Note>
    </Notes>
    <CVE>CVE-2024-49902</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49902.html</URL>
        <Description>CVE-2024-49902</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232378</URL>
        <Description>SUSE Bug 1232378</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232379</URL>
        <Description>SUSE Bug 1232379</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="98">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

jfs: Fix uaf in dbFreeBits

[syzbot reported]
==================================================================
BUG: KASAN: slab-use-after-free in __mutex_lock_common kernel/locking/mutex.c:587 [inline]
BUG: KASAN: slab-use-after-free in __mutex_lock+0xfe/0xd70 kernel/locking/mutex.c:752
Read of size 8 at addr ffff8880229254b0 by task syz-executor357/5216

CPU: 0 UID: 0 PID: 5216 Comm: syz-executor357 Not tainted 6.11.0-rc3-syzkaller-00156-gd7a5aa4b3c00 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:93 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119
 print_address_description mm/kasan/report.c:377 [inline]
 print_report+0x169/0x550 mm/kasan/report.c:488
 kasan_report+0x143/0x180 mm/kasan/report.c:601
 __mutex_lock_common kernel/locking/mutex.c:587 [inline]
 __mutex_lock+0xfe/0xd70 kernel/locking/mutex.c:752
 dbFreeBits+0x7ea/0xd90 fs/jfs/jfs_dmap.c:2390
 dbFreeDmap fs/jfs/jfs_dmap.c:2089 [inline]
 dbFree+0x35b/0x680 fs/jfs/jfs_dmap.c:409
 dbDiscardAG+0x8a9/0xa20 fs/jfs/jfs_dmap.c:1650
 jfs_ioc_trim+0x433/0x670 fs/jfs/jfs_discard.c:100
 jfs_ioctl+0x2d0/0x3e0 fs/jfs/ioctl.c:131
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:907 [inline]
 __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:893
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83

Freed by task 5218:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
 kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:579
 poison_slab_object+0xe0/0x150 mm/kasan/common.c:240
 __kasan_slab_free+0x37/0x60 mm/kasan/common.c:256
 kasan_slab_free include/linux/kasan.h:184 [inline]
 slab_free_hook mm/slub.c:2252 [inline]
 slab_free mm/slub.c:4473 [inline]
 kfree+0x149/0x360 mm/slub.c:4594
 dbUnmount+0x11d/0x190 fs/jfs/jfs_dmap.c:278
 jfs_mount_rw+0x4ac/0x6a0 fs/jfs/jfs_mount.c:247
 jfs_remount+0x3d1/0x6b0 fs/jfs/super.c:454
 reconfigure_super+0x445/0x880 fs/super.c:1083
 vfs_cmd_reconfigure fs/fsopen.c:263 [inline]
 vfs_fsconfig_locked fs/fsopen.c:292 [inline]
 __do_sys_fsconfig fs/fsopen.c:473 [inline]
 __se_sys_fsconfig+0xb6e/0xf80 fs/fsopen.c:345
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

[Analysis]
There are two paths (dbUnmount and jfs_ioc_trim) that generate race
condition when accessing bmap, which leads to the occurrence of uaf.

Use the lock s_umount to synchronize them, in order to avoid uaf caused
by race condition.</Note>
    </Notes>
    <CVE>CVE-2024-49903</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49903.html</URL>
        <Description>CVE-2024-49903</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232362</URL>
        <Description>SUSE Bug 1232362</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233020</URL>
        <Description>SUSE Bug 1233020</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="99">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add null check for 'afb' in amdgpu_dm_plane_handle_cursor_update (v2)

This commit adds a null check for the 'afb' variable in the
amdgpu_dm_plane_handle_cursor_update function. Previously, 'afb' was
assumed to be null, but was used later in the code without a null check.
This could potentially lead to a null pointer dereference.

Changes since v1:
- Moved the null check for 'afb' to the line where 'afb' is used. (Alex)

Fixes the below:
drivers/gpu/drm/amd/amdgpu/../display/amdgpu_dm/amdgpu_dm_plane.c:1298 amdgpu_dm_plane_handle_cursor_update() error: we previously assumed 'afb' could be null (see line 1252)</Note>
    </Notes>
    <CVE>CVE-2024-49905</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49905.html</URL>
        <Description>CVE-2024-49905</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232357</URL>
        <Description>SUSE Bug 1232357</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="100">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check null pointers before using dc-&gt;clk_mgr

[WHY &amp; HOW]
dc-&gt;clk_mgr is null checked previously in the same function, indicating
it might be null.

Passing "dc" to "dc-&gt;hwss.apply_idle_power_optimizations", which
dereferences null "dc-&gt;clk_mgr". (The function pointer resolves to
"dcn35_apply_idle_power_optimizations".)

This fixes 1 FORWARD_NULL issue reported by Coverity.</Note>
    </Notes>
    <CVE>CVE-2024-49907</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49907.html</URL>
        <Description>CVE-2024-49907</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232334</URL>
        <Description>SUSE Bug 1232334</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="101">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add null check for 'afb' in amdgpu_dm_update_cursor (v2)

This commit adds a null check for the 'afb' variable in the
amdgpu_dm_update_cursor function. Previously, 'afb' was assumed to be
null at line 8388, but was used later in the code without a null check.
This could potentially lead to a null pointer dereference.

Changes since v1:
- Moved the null check for 'afb' to the line where 'afb' is used. (Alex)

Fixes the below:
drivers/gpu/drm/amd/amdgpu/../display/amdgpu_dm/amdgpu_dm.c:8433 amdgpu_dm_update_cursor()
	error: we previously assumed 'afb' could be null (see line 8388)</Note>
    </Notes>
    <CVE>CVE-2024-49908</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49908.html</URL>
        <Description>CVE-2024-49908</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232335</URL>
        <Description>SUSE Bug 1232335</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="102">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check null pointers before used

[WHAT &amp; HOW]
Poniters, such as dc-&gt;clk_mgr, are null checked previously in the same
function, so Coverity warns "implies that "dc-&gt;clk_mgr" might be null".
As a result, these pointers need to be checked when used again.

This fixes 10 FORWARD_NULL issues reported by Coverity.</Note>
    </Notes>
    <CVE>CVE-2024-49921</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49921.html</URL>
        <Description>CVE-2024-49921</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232371</URL>
        <Description>SUSE Bug 1232371</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="103">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

fbdev: pxafb: Fix possible use after free in pxafb_task()

In the pxafb_probe function, it calls the pxafb_init_fbinfo function,
after which &amp;fbi-&gt;task is associated with pxafb_task. Moreover,
within this pxafb_init_fbinfo function, the pxafb_blank function
within the &amp;pxafb_ops struct is capable of scheduling work.

If we remove the module which will call pxafb_remove to make cleanup,
it will call unregister_framebuffer function which can call
do_unregister_framebuffer to free fbi-&gt;fb through
put_fb_info(fb_info), while the work mentioned above will be used.
The sequence of operations that may lead to a UAF bug is as follows:

CPU0                                                CPU1

                                   | pxafb_task
pxafb_remove                       |
unregister_framebuffer(info)       |
do_unregister_framebuffer(fb_info) |
put_fb_info(fb_info)               |
// free fbi-&gt;fb                    | set_ctrlr_state(fbi, state)
                                   | __pxafb_lcd_power(fbi, 0)
                                   | fbi-&gt;lcd_power(on, &amp;fbi-&gt;fb.var)
                                   | //use fbi-&gt;fb

Fix it by ensuring that the work is canceled before proceeding
with the cleanup in pxafb_remove.

Note that only root user can remove the driver at runtime.</Note>
    </Notes>
    <CVE>CVE-2024-49924</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49924.html</URL>
        <Description>CVE-2024-49924</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232364</URL>
        <Description>SUSE Bug 1232364</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="104">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

fbdev: efifb: Register sysfs groups through driver core

The driver core can register and cleanup sysfs groups already.
Make use of that functionality to simplify the error handling and
cleanup.

Also avoid a UAF race during unregistering where the sysctl attributes
were usable after the info struct was freed.</Note>
    </Notes>
    <CVE>CVE-2024-49925</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49925.html</URL>
        <Description>CVE-2024-49925</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232224</URL>
        <Description>SUSE Bug 1232224</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232225</URL>
        <Description>SUSE Bug 1232225</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="105">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name

It's observed that a crash occurs during hot-remove a memory device,
in which user is accessing the hugetlb. See calltrace as following:

------------[ cut here ]------------
WARNING: CPU: 1 PID: 14045 at arch/x86/mm/fault.c:1278 do_user_addr_fault+0x2a0/0x790
Modules linked in: kmem device_dax cxl_mem cxl_pmem cxl_port cxl_pci dax_hmem dax_pmem nd_pmem cxl_acpi nd_btt cxl_core crc32c_intel nvme virtiofs fuse nvme_core nfit libnvdimm dm_multipath scsi_dh_rdac scsi_dh_emc s
mirror dm_region_hash dm_log dm_mod
CPU: 1 PID: 14045 Comm: daxctl Not tainted 6.10.0-rc2-lizhijian+ #492
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
RIP: 0010:do_user_addr_fault+0x2a0/0x790
Code: 48 8b 00 a8 04 0f 84 b5 fe ff ff e9 1c ff ff ff 4c 89 e9 4c 89 e2 be 01 00 00 00 bf 02 00 00 00 e8 b5 ef 24 00 e9 42 fe ff ff &lt;0f&gt; 0b 48 83 c4 08 4c 89 ea 48 89 ee 4c 89 e7 5b 5d 41 5c 41 5d 41
RSP: 0000:ffffc90000a575f0 EFLAGS: 00010046
RAX: ffff88800c303600 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000001000 RSI: ffffffff82504162 RDI: ffffffff824b2c36
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffffc90000a57658
R13: 0000000000001000 R14: ffff88800bc2e040 R15: 0000000000000000
FS:  00007f51cb57d880(0000) GS:ffff88807fd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000001000 CR3: 00000000072e2004 CR4: 00000000001706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 ? __warn+0x8d/0x190
 ? do_user_addr_fault+0x2a0/0x790
 ? report_bug+0x1c3/0x1d0
 ? handle_bug+0x3c/0x70
 ? exc_invalid_op+0x14/0x70
 ? asm_exc_invalid_op+0x16/0x20
 ? do_user_addr_fault+0x2a0/0x790
 ? exc_page_fault+0x31/0x200
 exc_page_fault+0x68/0x200
&lt;...snip...&gt;
BUG: unable to handle page fault for address: 0000000000001000
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 800000000ad92067 P4D 800000000ad92067 PUD 7677067 PMD 0
 Oops: Oops: 0000 [#1] PREEMPT SMP PTI
 ---[ end trace 0000000000000000 ]---
 BUG: unable to handle page fault for address: 0000000000001000
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 800000000ad92067 P4D 800000000ad92067 PUD 7677067 PMD 0
 Oops: Oops: 0000 [#1] PREEMPT SMP PTI
 CPU: 1 PID: 14045 Comm: daxctl Kdump: loaded Tainted: G        W          6.10.0-rc2-lizhijian+ #492
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
 RIP: 0010:dentry_name+0x1f4/0x440
&lt;...snip...&gt;
? dentry_name+0x2fa/0x440
vsnprintf+0x1f3/0x4f0
vprintk_store+0x23a/0x540
vprintk_emit+0x6d/0x330
_printk+0x58/0x80
dump_mapping+0x10b/0x1a0
? __pfx_free_object_rcu+0x10/0x10
__dump_page+0x26b/0x3e0
? vprintk_emit+0xe0/0x330
? _printk+0x58/0x80
? dump_page+0x17/0x50
dump_page+0x17/0x50
do_migrate_range+0x2f7/0x7f0
? do_migrate_range+0x42/0x7f0
? offline_pages+0x2f4/0x8c0
offline_pages+0x60a/0x8c0
memory_subsys_offline+0x9f/0x1c0
? lockdep_hardirqs_on+0x77/0x100
? _raw_spin_unlock_irqrestore+0x38/0x60
device_offline+0xe3/0x110
state_store+0x6e/0xc0
kernfs_fop_write_iter+0x143/0x200
vfs_write+0x39f/0x560
ksys_write+0x65/0xf0
do_syscall_64+0x62/0x130

Previously, some sanity check have been done in dump_mapping() before
the print facility parsing '%pd' though, it's still possible to run into
an invalid dentry.d_name.name.

Since dump_mapping() only needs to dump the filename only, retrieve it
by itself in a safer way to prevent an unnecessary crash.

Note that either retrieving the filename with '%pd' or
strncpy_from_kernel_nofault(), the filename could be unreliable.</Note>
    </Notes>
    <CVE>CVE-2024-49934</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49934.html</URL>
        <Description>CVE-2024-49934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232387</URL>
        <Description>SUSE Bug 1232387</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="106">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ACPI: PAD: fix crash in exit_round_robin()

The kernel occasionally crashes in cpumask_clear_cpu(), which is called
within exit_round_robin(), because when executing clear_bit(nr, addr) with
nr set to 0xffffffff, the address calculation may cause misalignment within
the memory, leading to access to an invalid memory address.

----------
BUG: unable to handle kernel paging request at ffffffffe0740618
        ...
CPU: 3 PID: 2919323 Comm: acpi_pad/14 Kdump: loaded Tainted: G           OE  X --------- -  - 4.18.0-425.19.2.el8_7.x86_64 #1
        ...
RIP: 0010:power_saving_thread+0x313/0x411 [acpi_pad]
Code: 89 cd 48 89 d3 eb d1 48 c7 c7 55 70 72 c0 e8 64 86 b0 e4 c6 05 0d a1 02 00 01 e9 bc fd ff ff 45 89 e4 42 8b 04 a5 20 82 72 c0 &lt;f0&gt; 48 0f b3 05 f4 9c 01 00 42 c7 04 a5 20 82 72 c0 ff ff ff ff 31
RSP: 0018:ff72a5d51fa77ec8 EFLAGS: 00010202
RAX: 00000000ffffffff RBX: ff462981e5d8cb80 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000246 RDI: 0000000000000246
RBP: ff46297556959d80 R08: 0000000000000382 R09: ff46297c8d0f38d8
R10: 0000000000000000 R11: 0000000000000001 R12: 000000000000000e
R13: 0000000000000000 R14: ffffffffffffffff R15: 000000000000000e
FS:  0000000000000000(0000) GS:ff46297a800c0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffe0740618 CR3: 0000007e20410004 CR4: 0000000000771ee0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 ? acpi_pad_add+0x120/0x120 [acpi_pad]
 kthread+0x10b/0x130
 ? set_kthread_struct+0x50/0x50
 ret_from_fork+0x1f/0x40
        ...
CR2: ffffffffe0740618

crash&gt; dis -lr ffffffffc0726923
        ...
/usr/src/debug/kernel-4.18.0-425.19.2.el8_7/linux-4.18.0-425.19.2.el8_7.x86_64/./include/linux/cpumask.h: 114
0xffffffffc0726918 &lt;power_saving_thread+776&gt;:	mov    %r12d,%r12d
/usr/src/debug/kernel-4.18.0-425.19.2.el8_7/linux-4.18.0-425.19.2.el8_7.x86_64/./include/linux/cpumask.h: 325
0xffffffffc072691b &lt;power_saving_thread+779&gt;:	mov    -0x3f8d7de0(,%r12,4),%eax
/usr/src/debug/kernel-4.18.0-425.19.2.el8_7/linux-4.18.0-425.19.2.el8_7.x86_64/./arch/x86/include/asm/bitops.h: 80
0xffffffffc0726923 &lt;power_saving_thread+787&gt;:	lock btr %rax,0x19cf4(%rip)        # 0xffffffffc0740620 &lt;pad_busy_cpus_bits&gt;

crash&gt; px tsk_in_cpu[14]
$66 = 0xffffffff

crash&gt; px 0xffffffffc072692c+0x19cf4
$99 = 0xffffffffc0740620

crash&gt; sym 0xffffffffc0740620
ffffffffc0740620 (b) pad_busy_cpus_bits [acpi_pad]

crash&gt; px pad_busy_cpus_bits[0]
$42 = 0xfffc0
----------

To fix this, ensure that tsk_in_cpu[tsk_index] != -1 before calling
cpumask_clear_cpu() in exit_round_robin(), just as it is done in
round_robin_cpu().

[ rjw: Subject edit, avoid updates to the same value ]</Note>
    </Notes>
    <CVE>CVE-2024-49935</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49935.html</URL>
        <Description>CVE-2024-49935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232370</URL>
        <Description>SUSE Bug 1232370</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="107">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit

Syzbot points out that skb_trim() has a sanity check on the existing length of
the skb, which can be uninitialised in some error paths. The intent here is
clearly just to reset the length to zero before resubmitting, so switch to
calling __skb_set_length(skb, 0) directly. In addition, __skb_set_length()
already contains a call to skb_reset_tail_pointer(), so remove the redundant
call.

The syzbot report came from ath9k_hif_usb_reg_in_cb(), but there's a similar
usage of skb_trim() in ath9k_hif_usb_rx_cb(), change both while we're at it.</Note>
    </Notes>
    <CVE>CVE-2024-49938</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49938.html</URL>
        <Description>CVE-2024-49938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232552</URL>
        <Description>SUSE Bug 1232552</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="108">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/ncsi: Disable the ncsi work before freeing the associated structure

The work function can run after the ncsi device is freed, resulting
in use-after-free bugs or kernel panic.</Note>
    </Notes>
    <CVE>CVE-2024-49945</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49945.html</URL>
        <Description>CVE-2024-49945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232165</URL>
        <Description>SUSE Bug 1232165</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="109">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: test for not too small csum_start in virtio_net_hdr_to_skb()

syzbot was able to trigger this warning [1], after injecting a
malicious packet through af_packet, setting skb-&gt;csum_start and thus
the transport header to an incorrect value.

We can at least make sure the transport header is after
the end of the network header (with a estimated minimal size).

[1]
[   67.873027] skb len=4096 headroom=16 headlen=14 tailroom=0
mac=(-1,-1) mac_len=0 net=(16,-6) trans=10
shinfo(txflags=0 nr_frags=1 gso(size=0 type=0 segs=0))
csum(0xa start=10 offset=0 ip_summed=3 complete_sw=0 valid=0 level=0)
hash(0x0 sw=0 l4=0) proto=0x0800 pkttype=0 iif=0
priority=0x0 mark=0x0 alloc_cpu=10 vlan_all=0x0
encapsulation=0 inner(proto=0x0000, mac=0, net=0, trans=0)
[   67.877172] dev name=veth0_vlan feat=0x000061164fdd09e9
[   67.877764] sk family=17 type=3 proto=0
[   67.878279] skb linear:   00000000: 00 00 10 00 00 00 00 00 0f 00 00 00 08 00
[   67.879128] skb frag:     00000000: 0e 00 07 00 00 00 28 00 08 80 1c 00 04 00 00 02
[   67.879877] skb frag:     00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.880647] skb frag:     00000020: 00 00 02 00 00 00 08 00 1b 00 00 00 00 00 00 00
[   67.881156] skb frag:     00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.881753] skb frag:     00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.882173] skb frag:     00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.882790] skb frag:     00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.883171] skb frag:     00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.883733] skb frag:     00000080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.884206] skb frag:     00000090: 00 00 00 00 00 00 00 00 00 00 69 70 76 6c 61 6e
[   67.884704] skb frag:     000000a0: 31 00 00 00 00 00 00 00 00 00 2b 00 00 00 00 00
[   67.885139] skb frag:     000000b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.885677] skb frag:     000000c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.886042] skb frag:     000000d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.886408] skb frag:     000000e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.887020] skb frag:     000000f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.887384] skb frag:     00000100: 00 00
[   67.887878] ------------[ cut here ]------------
[   67.887908] offset (-6) &gt;= skb_headlen() (14)
[   67.888445] WARNING: CPU: 10 PID: 2088 at net/core/dev.c:3332 skb_checksum_help (net/core/dev.c:3332 (discriminator 2))
[   67.889353] Modules linked in: macsec macvtap macvlan hsr wireguard curve25519_x86_64 libcurve25519_generic libchacha20poly1305 chacha_x86_64 libchacha poly1305_x86_64 dummy bridge sr_mod cdrom evdev pcspkr i2c_piix4 9pnet_virtio 9p 9pnet netfs
[   67.890111] CPU: 10 UID: 0 PID: 2088 Comm: b363492833 Not tainted 6.11.0-virtme #1011
[   67.890183] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   67.890309] RIP: 0010:skb_checksum_help (net/core/dev.c:3332 (discriminator 2))
[   67.891043] Call Trace:
[   67.891173]  &lt;TASK&gt;
[   67.891274] ? __warn (kernel/panic.c:741)
[   67.891320] ? skb_checksum_help (net/core/dev.c:3332 (discriminator 2))
[   67.891333] ? report_bug (lib/bug.c:180 lib/bug.c:219)
[   67.891348] ? handle_bug (arch/x86/kernel/traps.c:239)
[   67.891363] ? exc_invalid_op (arch/x86/kernel/traps.c:260 (discriminator 1))
[   67.891372] ? asm_exc_invalid_op (./arch/x86/include/asm/idtentry.h:621)
[   67.891388] ? skb_checksum_help (net/core/dev.c:3332 (discriminator 2))
[   67.891399] ? skb_checksum_help (net/core/dev.c:3332 (discriminator 2))
[   67.891416] ip_do_fragment (net/ipv4/ip_output.c:777 (discriminator 1))
[   67.891448] ? __ip_local_out (./include/linux/skbuff.h:1146 ./include/net/l3mdev.h:196 ./include/net/l3mdev.h:213 ne
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-49947</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49947.html</URL>
        <Description>CVE-2024-49947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232162</URL>
        <Description>SUSE Bug 1232162</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="110">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: Fix uaf in l2cap_connect

[Syzbot reported]
BUG: KASAN: slab-use-after-free in l2cap_connect.constprop.0+0x10d8/0x1270 net/bluetooth/l2cap_core.c:3949
Read of size 8 at addr ffff8880241e9800 by task kworker/u9:0/54

CPU: 0 UID: 0 PID: 54 Comm: kworker/u9:0 Not tainted 6.11.0-rc6-syzkaller-00268-g788220eee30d #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
Workqueue: hci2 hci_rx_work
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:93 [inline]
 dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:119
 print_address_description mm/kasan/report.c:377 [inline]
 print_report+0xc3/0x620 mm/kasan/report.c:488
 kasan_report+0xd9/0x110 mm/kasan/report.c:601
 l2cap_connect.constprop.0+0x10d8/0x1270 net/bluetooth/l2cap_core.c:3949
 l2cap_connect_req net/bluetooth/l2cap_core.c:4080 [inline]
 l2cap_bredr_sig_cmd net/bluetooth/l2cap_core.c:4772 [inline]
 l2cap_sig_channel net/bluetooth/l2cap_core.c:5543 [inline]
 l2cap_recv_frame+0xf0b/0x8eb0 net/bluetooth/l2cap_core.c:6825
 l2cap_recv_acldata+0x9b4/0xb70 net/bluetooth/l2cap_core.c:7514
 hci_acldata_packet net/bluetooth/hci_core.c:3791 [inline]
 hci_rx_work+0xaab/0x1610 net/bluetooth/hci_core.c:4028
 process_one_work+0x9c5/0x1b40 kernel/workqueue.c:3231
 process_scheduled_works kernel/workqueue.c:3312 [inline]
 worker_thread+0x6c8/0xed0 kernel/workqueue.c:3389
 kthread+0x2c1/0x3a0 kernel/kthread.c:389
 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
...

Freed by task 5245:
 kasan_save_stack+0x33/0x60 mm/kasan/common.c:47
 kasan_save_track+0x14/0x30 mm/kasan/common.c:68
 kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:579
 poison_slab_object+0xf7/0x160 mm/kasan/common.c:240
 __kasan_slab_free+0x32/0x50 mm/kasan/common.c:256
 kasan_slab_free include/linux/kasan.h:184 [inline]
 slab_free_hook mm/slub.c:2256 [inline]
 slab_free mm/slub.c:4477 [inline]
 kfree+0x12a/0x3b0 mm/slub.c:4598
 l2cap_conn_free net/bluetooth/l2cap_core.c:1810 [inline]
 kref_put include/linux/kref.h:65 [inline]
 l2cap_conn_put net/bluetooth/l2cap_core.c:1822 [inline]
 l2cap_conn_del+0x59d/0x730 net/bluetooth/l2cap_core.c:1802
 l2cap_connect_cfm+0x9e6/0xf80 net/bluetooth/l2cap_core.c:7241
 hci_connect_cfm include/net/bluetooth/hci_core.h:1960 [inline]
 hci_conn_failed+0x1c3/0x370 net/bluetooth/hci_conn.c:1265
 hci_abort_conn_sync+0x75a/0xb50 net/bluetooth/hci_sync.c:5583
 abort_conn_sync+0x197/0x360 net/bluetooth/hci_conn.c:2917
 hci_cmd_sync_work+0x1a4/0x410 net/bluetooth/hci_sync.c:328
 process_one_work+0x9c5/0x1b40 kernel/workqueue.c:3231
 process_scheduled_works kernel/workqueue.c:3312 [inline]
 worker_thread+0x6c8/0xed0 kernel/workqueue.c:3389
 kthread+0x2c1/0x3a0 kernel/kthread.c:389
 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244</Note>
    </Notes>
    <CVE>CVE-2024-49950</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49950.html</URL>
        <Description>CVE-2024-49950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225742</URL>
        <Description>SUSE Bug 1225742</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232159</URL>
        <Description>SUSE Bug 1232159</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="111">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix null-ptr-deref when journal load failed.

During the mounting process, if journal_reset() fails because of too short
journal, then lead to jbd2_journal_load() fails with NULL j_sb_buffer. 
Subsequently, ocfs2_journal_shutdown() calls
jbd2_journal_flush()-&gt;jbd2_cleanup_journal_tail()-&gt;
__jbd2_update_log_tail()-&gt;jbd2_journal_update_sb_log_tail()
-&gt;lock_buffer(journal-&gt;j_sb_buffer), resulting in a null-pointer
dereference error.

To resolve this issue, we should check the JBD2_LOADED flag to ensure the
journal was properly loaded.  Additionally, use journal instead of
osb-&gt;journal directly to simplify the code.</Note>
    </Notes>
    <CVE>CVE-2024-49957</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49957.html</URL>
        <Description>CVE-2024-49957</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232152</URL>
        <Description>SUSE Bug 1232152</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="112">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mailbox: bcm2835: Fix timeout during suspend mode

During noirq suspend phase the Raspberry Pi power driver suffer of
firmware property timeouts. The reason is that the IRQ of the underlying
BCM2835 mailbox is disabled and rpi_firmware_property_list() will always
run into a timeout [1].

Since the VideoCore side isn't consider as a wakeup source, set the
IRQF_NO_SUSPEND flag for the mailbox IRQ in order to keep it enabled
during suspend-resume cycle.

[1]
PM: late suspend of devices complete after 1.754 msecs
WARNING: CPU: 0 PID: 438 at drivers/firmware/raspberrypi.c:128
 rpi_firmware_property_list+0x204/0x22c
Firmware transaction 0x00028001 timeout
Modules linked in:
CPU: 0 PID: 438 Comm: bash Tainted: G         C         6.9.3-dirty #17
Hardware name: BCM2835
Call trace:
unwind_backtrace from show_stack+0x18/0x1c
show_stack from dump_stack_lvl+0x34/0x44
dump_stack_lvl from __warn+0x88/0xec
__warn from warn_slowpath_fmt+0x7c/0xb0
warn_slowpath_fmt from rpi_firmware_property_list+0x204/0x22c
rpi_firmware_property_list from rpi_firmware_property+0x68/0x8c
rpi_firmware_property from rpi_firmware_set_power+0x54/0xc0
rpi_firmware_set_power from _genpd_power_off+0xe4/0x148
_genpd_power_off from genpd_sync_power_off+0x7c/0x11c
genpd_sync_power_off from genpd_finish_suspend+0xcc/0xe0
genpd_finish_suspend from dpm_run_callback+0x78/0xd0
dpm_run_callback from device_suspend_noirq+0xc0/0x238
device_suspend_noirq from dpm_suspend_noirq+0xb0/0x168
dpm_suspend_noirq from suspend_devices_and_enter+0x1b8/0x5ac
suspend_devices_and_enter from pm_suspend+0x254/0x2e4
pm_suspend from state_store+0xa8/0xd4
state_store from kernfs_fop_write_iter+0x154/0x1a0
kernfs_fop_write_iter from vfs_write+0x12c/0x184
vfs_write from ksys_write+0x78/0xc0
ksys_write from ret_fast_syscall+0x0/0x54
Exception stack(0xcc93dfa8 to 0xcc93dff0)
[...]
PM: noirq suspend of devices complete after 3095.584 msecs</Note>
    </Notes>
    <CVE>CVE-2024-49963</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49963.html</URL>
        <Description>CVE-2024-49963</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232147</URL>
        <Description>SUSE Bug 1232147</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="113">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ocfs2: remove unreasonable unlock in ocfs2_read_blocks

Patch series "Misc fixes for ocfs2_read_blocks", v5.

This series contains 2 fixes for ocfs2_read_blocks().  The first patch fix
the issue reported by syzbot, which detects bad unlock balance in
ocfs2_read_blocks().  The second patch fixes an issue reported by Heming
Zhao when reviewing above fix.


This patch (of 2):

There was a lock release before exiting, so remove the unreasonable unlock.</Note>
    </Notes>
    <CVE>CVE-2024-49965</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49965.html</URL>
        <Description>CVE-2024-49965</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232142</URL>
        <Description>SUSE Bug 1232142</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="114">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ocfs2: cancel dqi_sync_work before freeing oinfo

ocfs2_global_read_info() will initialize and schedule dqi_sync_work at the
end, if error occurs after successfully reading global quota, it will
trigger the following warning with CONFIG_DEBUG_OBJECTS_* enabled:

ODEBUG: free active (active state 0) object: 00000000d8b0ce28 object type: timer_list hint: qsync_work_fn+0x0/0x16c

This reports that there is an active delayed work when freeing oinfo in
error handling, so cancel dqi_sync_work first.  BTW, return status instead
of -1 when .read_file_info fails.</Note>
    </Notes>
    <CVE>CVE-2024-49966</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49966.html</URL>
        <Description>CVE-2024-49966</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232141</URL>
        <Description>SUSE Bug 1232141</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="115">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ext4: filesystems without casefold feature cannot be mounted with siphash

When mounting the ext4 filesystem, if the default hash version is set to
DX_HASH_SIPHASH but the casefold feature is not set, exit the mounting.</Note>
    </Notes>
    <CVE>CVE-2024-49968</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49968.html</URL>
        <Description>CVE-2024-49968</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232264</URL>
        <Description>SUSE Bug 1232264</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="116">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

media: venus: fix use after free bug in venus_remove due to race condition

in venus_probe, core-&gt;work is bound with venus_sys_error_handler, which is
used to handle error. The code use core-&gt;sys_err_done to make sync work.
The core-&gt;work is started in venus_event_notify.

If we call venus_remove, there might be an unfished work. The possible
sequence is as follows:

CPU0                  CPU1

                     |venus_sys_error_handler
venus_remove         |
hfi_destroy	 		 |
venus_hfi_destroy	 |
kfree(hdev);	     |
                     |hfi_reinit
					 |venus_hfi_queues_reinit
                     |//use hdev

Fix it by canceling the work in venus_remove.</Note>
    </Notes>
    <CVE>CVE-2024-49981</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49981.html</URL>
        <Description>CVE-2024-49981</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232098</URL>
        <Description>SUSE Bug 1232098</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="117">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free

When calling ext4_force_split_extent_at() in ext4_ext_replay_update_ex(),
the 'ppath' is updated but it is the 'path' that is freed, thus potentially
triggering a double-free in the following process:

ext4_ext_replay_update_ex
  ppath = path
  ext4_force_split_extent_at(&amp;ppath)
    ext4_split_extent_at
      ext4_ext_insert_extent
        ext4_ext_create_new_leaf
          ext4_ext_grow_indepth
            ext4_find_extent
              if (depth &gt; path[0].p_maxdepth)
                kfree(path)                 ---&gt; path First freed
                *orig_path = path = NULL    ---&gt; null ppath
  kfree(path)                               ---&gt; path double-free !!!

So drop the unnecessary ppath and use path directly to avoid this problem.
And use ext4_find_extent() directly to update path, avoiding unnecessary
memory allocation and freeing. Also, propagate the error returned by
ext4_find_extent() instead of using strange error codes.</Note>
    </Notes>
    <CVE>CVE-2024-49983</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49983.html</URL>
        <Description>CVE-2024-49983</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232096</URL>
        <Description>SUSE Bug 1232096</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="118">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume

In case there is any sort of clock controller attached to this I2C bus
controller, for example Versaclock or even an AIC32x4 I2C codec, then
an I2C transfer triggered from the clock controller clk_ops .prepare
callback may trigger a deadlock on drivers/clk/clk.c prepare_lock mutex.

This is because the clock controller first grabs the prepare_lock mutex
and then performs the prepare operation, including its I2C access. The
I2C access resumes this I2C bus controller via .runtime_resume callback,
which calls clk_prepare_enable(), which attempts to grab the prepare_lock
mutex again and deadlocks.

Since the clock are already prepared since probe() and unprepared in
remove(), use simple clk_enable()/clk_disable() calls to enable and
disable the clock on runtime suspend and resume, to avoid hitting the
prepare_lock mutex.</Note>
    </Notes>
    <CVE>CVE-2024-49985</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49985.html</URL>
        <Description>CVE-2024-49985</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232094</URL>
        <Description>SUSE Bug 1232094</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="119">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: fix double free issue during amdgpu module unload

Flexible endpoints use DIGs from available inflexible endpoints,
so only the encoders of inflexible links need to be freed.
Otherwise, a double free issue may occur when unloading the
amdgpu module.

[  279.190523] RIP: 0010:__slab_free+0x152/0x2f0
[  279.190577] Call Trace:
[  279.190580]  &lt;TASK&gt;
[  279.190582]  ? show_regs+0x69/0x80
[  279.190590]  ? die+0x3b/0x90
[  279.190595]  ? do_trap+0xc8/0xe0
[  279.190601]  ? do_error_trap+0x73/0xa0
[  279.190605]  ? __slab_free+0x152/0x2f0
[  279.190609]  ? exc_invalid_op+0x56/0x70
[  279.190616]  ? __slab_free+0x152/0x2f0
[  279.190642]  ? asm_exc_invalid_op+0x1f/0x30
[  279.190648]  ? dcn10_link_encoder_destroy+0x19/0x30 [amdgpu]
[  279.191096]  ? __slab_free+0x152/0x2f0
[  279.191102]  ? dcn10_link_encoder_destroy+0x19/0x30 [amdgpu]
[  279.191469]  kfree+0x260/0x2b0
[  279.191474]  dcn10_link_encoder_destroy+0x19/0x30 [amdgpu]
[  279.191821]  link_destroy+0xd7/0x130 [amdgpu]
[  279.192248]  dc_destruct+0x90/0x270 [amdgpu]
[  279.192666]  dc_destroy+0x19/0x40 [amdgpu]
[  279.193020]  amdgpu_dm_fini+0x16e/0x200 [amdgpu]
[  279.193432]  dm_hw_fini+0x26/0x40 [amdgpu]
[  279.193795]  amdgpu_device_fini_hw+0x24c/0x400 [amdgpu]
[  279.194108]  amdgpu_driver_unload_kms+0x4f/0x70 [amdgpu]
[  279.194436]  amdgpu_pci_remove+0x40/0x80 [amdgpu]
[  279.194632]  pci_device_remove+0x3a/0xa0
[  279.194638]  device_remove+0x40/0x70
[  279.194642]  device_release_driver_internal+0x1ad/0x210
[  279.194647]  driver_detach+0x4e/0xa0
[  279.194650]  bus_remove_driver+0x6f/0xf0
[  279.194653]  driver_unregister+0x33/0x60
[  279.194657]  pci_unregister_driver+0x44/0x90
[  279.194662]  amdgpu_exit+0x19/0x1f0 [amdgpu]
[  279.194939]  __do_sys_delete_module.isra.0+0x198/0x2f0
[  279.194946]  __x64_sys_delete_module+0x16/0x20
[  279.194950]  do_syscall_64+0x58/0x120
[  279.194954]  entry_SYSCALL_64_after_hwframe+0x6e/0x76
[  279.194980]  &lt;/TASK&gt;</Note>
    </Notes>
    <CVE>CVE-2024-49989</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-49989.html</URL>
        <Description>CVE-2024-49989</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232483</URL>
        <Description>SUSE Bug 1232483</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="120">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix system hang while resume with TBT monitor

[Why]
Connected with a Thunderbolt monitor and do the suspend and the system
may hang while resume.

The TBT monitor HPD will be triggered during the resume procedure
and call the drm_client_modeset_probe() while
struct drm_connector connector-&gt;dev-&gt;master is NULL.

It will mess up the pipe topology after resume.

[How]
Skip the TBT monitor HPD during the resume procedure because we
currently will probe the connectors after resume by default.

(cherry picked from commit 453f86a26945207a16b8f66aaed5962dc2b95b85)</Note>
    </Notes>
    <CVE>CVE-2024-50003</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50003.html</URL>
        <Description>CVE-2024-50003</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232385</URL>
        <Description>SUSE Bug 1232385</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="121">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ALSA: asihpi: Fix potential OOB array access

ASIHPI driver stores some values in the static array upon a response
from the driver, and its index depends on the firmware.  We shouldn't
trust it blindly.

This patch adds a sanity check of the array index to fit in the array
size.</Note>
    </Notes>
    <CVE>CVE-2024-50007</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50007.html</URL>
        <Description>CVE-2024-50007</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232394</URL>
        <Description>SUSE Bug 1232394</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="122">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext()

Replace one-element array with a flexible-array member in
`struct host_cmd_ds_802_11_scan_ext`.

With this, fix the following warning:

elo 16 17:51:58 surfacebook kernel: ------------[ cut here ]------------
elo 16 17:51:58 surfacebook kernel: memcpy: detected field-spanning write (size 243) of single field "ext_scan-&gt;tlv_buffer" at drivers/net/wireless/marvell/mwifiex/scan.c:2239 (size 1)
elo 16 17:51:58 surfacebook kernel: WARNING: CPU: 0 PID: 498 at drivers/net/wireless/marvell/mwifiex/scan.c:2239 mwifiex_cmd_802_11_scan_ext+0x83/0x90 [mwifiex]</Note>
    </Notes>
    <CVE>CVE-2024-50008</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50008.html</URL>
        <Description>CVE-2024-50008</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232317</URL>
        <Description>SUSE Bug 1232317</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="123">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value

cpufreq_cpu_get may return NULL. To avoid NULL-dereference check it
and return in case of error.

Found by Linux Verification Center (linuxtesting.org) with SVACE.</Note>
    </Notes>
    <CVE>CVE-2024-50009</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50009.html</URL>
        <Description>CVE-2024-50009</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232318</URL>
        <Description>SUSE Bug 1232318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="124">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

exfat: fix memory leak in exfat_load_bitmap()

If the first directory entry in the root directory is not a bitmap
directory entry, 'bh' will not be released and reassigned, which
will cause a memory leak.</Note>
    </Notes>
    <CVE>CVE-2024-50013</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50013.html</URL>
        <Description>CVE-2024-50013</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232080</URL>
        <Description>SUSE Bug 1232080</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="125">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

x86/mm/ident_map: Use gbpages only where full GB page should be mapped.

When ident_pud_init() uses only GB pages to create identity maps, large
ranges of addresses not actually requested can be included in the resulting
table; a 4K request will map a full GB.  This can include a lot of extra
address space past that requested, including areas marked reserved by the
BIOS.  That allows processor speculation into reserved regions, that on UV
systems can cause system halts.

Only use GB pages when map creation requests include the full GB page of
space.  Fall back to using smaller 2M pages when only portions of a GB page
are included in the request.

No attempt is made to coalesce mapping requests. If a request requires a
map entry at the 2M (pmd) level, subsequent mapping requests within the
same 1G region will also be at the pmd level, even if adjacent or
overlapping such requests could have been combined to map a full GB page.
Existing usage starts with larger regions and then adds smaller regions, so
this should not have any great consequence.</Note>
    </Notes>
    <CVE>CVE-2024-50017</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50017.html</URL>
        <Description>CVE-2024-50017</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232312</URL>
        <Description>SUSE Bug 1232312</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="126">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: fnic: Move flush_work initialization out of if block

After commit 379a58caa199 ("scsi: fnic: Move fnic_fnic_flush_tx() to a
work queue"), it can happen that a work item is sent to an uninitialized
work queue.  This may has the effect that the item being queued is never
actually queued, and any further actions depending on it will not
proceed.

The following warning is observed while the fnic driver is loaded:

kernel: WARNING: CPU: 11 PID: 0 at ../kernel/workqueue.c:1524 __queue_work+0x373/0x410
kernel:  &lt;IRQ&gt;
kernel:  queue_work_on+0x3a/0x50
kernel:  fnic_wq_copy_cmpl_handler+0x54a/0x730 [fnic 62fbff0c42e7fb825c60a55cde2fb91facb2ed24]
kernel:  fnic_isr_msix_wq_copy+0x2d/0x60 [fnic 62fbff0c42e7fb825c60a55cde2fb91facb2ed24]
kernel:  __handle_irq_event_percpu+0x36/0x1a0
kernel:  handle_irq_event_percpu+0x30/0x70
kernel:  handle_irq_event+0x34/0x60
kernel:  handle_edge_irq+0x7e/0x1a0
kernel:  __common_interrupt+0x3b/0xb0
kernel:  common_interrupt+0x58/0xa0
kernel:  &lt;/IRQ&gt;

It has been observed that this may break the rediscovery of Fibre
Channel devices after a temporary fabric failure.

This patch fixes it by moving the work queue initialization out of
an if block in fnic_probe().</Note>
    </Notes>
    <CVE>CVE-2024-50025</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50025.html</URL>
        <Description>CVE-2024-50025</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231953</URL>
        <Description>SUSE Bug 1231953</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="127">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: wd33c93: Don't use stale scsi_pointer value

A regression was introduced with commit dbb2da557a6a ("scsi: wd33c93:
Move the SCSI pointer to private command data") which results in an oops
in wd33c93_intr(). That commit added the scsi_pointer variable and
initialized it from hostdata-&gt;connected. However, during selection,
hostdata-&gt;connected is not yet valid. Fix this by getting the current
scsi_pointer from hostdata-&gt;selecting.</Note>
    </Notes>
    <CVE>CVE-2024-50026</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50026.html</URL>
        <Description>CVE-2024-50026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231952</URL>
        <Description>SUSE Bug 1231952</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="128">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/v3d: Stop the active perfmon before being destroyed

When running `kmscube` with one or more performance monitors enabled
via `GALLIUM_HUD`, the following kernel panic can occur:

[   55.008324] Unable to handle kernel paging request at virtual address 00000000052004a4
[   55.008368] Mem abort info:
[   55.008377]   ESR = 0x0000000096000005
[   55.008387]   EC = 0x25: DABT (current EL), IL = 32 bits
[   55.008402]   SET = 0, FnV = 0
[   55.008412]   EA = 0, S1PTW = 0
[   55.008421]   FSC = 0x05: level 1 translation fault
[   55.008434] Data abort info:
[   55.008442]   ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000
[   55.008455]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[   55.008467]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[   55.008481] user pgtable: 4k pages, 39-bit VAs, pgdp=00000001046c6000
[   55.008497] [00000000052004a4] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000
[   55.008525] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[   55.008542] Modules linked in: rfcomm [...] vc4 v3d snd_soc_hdmi_codec drm_display_helper
gpu_sched drm_shmem_helper cec drm_dma_helper drm_kms_helper i2c_brcmstb
drm drm_panel_orientation_quirks snd_soc_core snd_compress snd_pcm_dmaengine snd_pcm snd_timer snd backlight
[   55.008799] CPU: 2 PID: 166 Comm: v3d_bin Tainted: G         C         6.6.47+rpt-rpi-v8 #1  Debian 1:6.6.47-1+rpt1
[   55.008824] Hardware name: Raspberry Pi 4 Model B Rev 1.5 (DT)
[   55.008838] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   55.008855] pc : __mutex_lock.constprop.0+0x90/0x608
[   55.008879] lr : __mutex_lock.constprop.0+0x58/0x608
[   55.008895] sp : ffffffc080673cf0
[   55.008904] x29: ffffffc080673cf0 x28: 0000000000000000 x27: ffffff8106188a28
[   55.008926] x26: ffffff8101e78040 x25: ffffff8101baa6c0 x24: ffffffd9d989f148
[   55.008947] x23: ffffffda1c2a4008 x22: 0000000000000002 x21: ffffffc080673d38
[   55.008968] x20: ffffff8101238000 x19: ffffff8104f83188 x18: 0000000000000000
[   55.008988] x17: 0000000000000000 x16: ffffffda1bd04d18 x15: 00000055bb08bc90
[   55.009715] x14: 0000000000000000 x13: 0000000000000000 x12: ffffffda1bd4cbb0
[   55.010433] x11: 00000000fa83b2da x10: 0000000000001a40 x9 : ffffffda1bd04d04
[   55.011162] x8 : ffffff8102097b80 x7 : 0000000000000000 x6 : 00000000030a5857
[   55.011880] x5 : 00ffffffffffffff x4 : 0300000005200470 x3 : 0300000005200470
[   55.012598] x2 : ffffff8101238000 x1 : 0000000000000021 x0 : 0300000005200470
[   55.013292] Call trace:
[   55.013959]  __mutex_lock.constprop.0+0x90/0x608
[   55.014646]  __mutex_lock_slowpath+0x1c/0x30
[   55.015317]  mutex_lock+0x50/0x68
[   55.015961]  v3d_perfmon_stop+0x40/0xe0 [v3d]
[   55.016627]  v3d_bin_job_run+0x10c/0x2d8 [v3d]
[   55.017282]  drm_sched_main+0x178/0x3f8 [gpu_sched]
[   55.017921]  kthread+0x11c/0x128
[   55.018554]  ret_from_fork+0x10/0x20
[   55.019168] Code: f9400260 f1001c1f 54001ea9 927df000 (b9403401)
[   55.019776] ---[ end trace 0000000000000000 ]---
[   55.020411] note: v3d_bin[166] exited with preempt_count 1

This issue arises because, upon closing the file descriptor (which happens
when we interrupt `kmscube`), the active performance monitor is not
stopped. Although all perfmons are destroyed in `v3d_perfmon_close_file()`,
the active performance monitor's pointer (`v3d-&gt;active_perfmon`) is still
retained.

If `kmscube` is run again, the driver will attempt to stop the active
performance monitor using the stale pointer in `v3d-&gt;active_perfmon`.
However, this pointer is no longer valid because the previous process has
already terminated, and all performance monitors associated with it have
been destroyed and freed.

To fix this, when the active performance monitor belongs to a given
process, explicitly stop it before destroying and freeing it.</Note>
    </Notes>
    <CVE>CVE-2024-50031</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50031.html</URL>
        <Description>CVE-2024-50031</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231947</URL>
        <Description>SUSE Bug 1231947</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="129">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change

rfcomm_sk_state_change attempts to use sock_lock so it must never be
called with it locked but rfcomm_sock_ioctl always attempt to lock it
causing the following trace:

======================================================
WARNING: possible circular locking dependency detected
6.8.0-syzkaller-08951-gfe46a7dd189e #0 Not tainted
------------------------------------------------------
syz-executor386/5093 is trying to acquire lock:
ffff88807c396258 (sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1671 [inline]
ffff88807c396258 (sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM){+.+.}-{0:0}, at: rfcomm_sk_state_change+0x5b/0x310 net/bluetooth/rfcomm/sock.c:73

but task is already holding lock:
ffff88807badfd28 (&amp;d-&gt;lock){+.+.}-{3:3}, at: __rfcomm_dlc_close+0x226/0x6a0 net/bluetooth/rfcomm/core.c:491</Note>
    </Notes>
    <CVE>CVE-2024-50044</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50044.html</URL>
        <Description>CVE-2024-50044</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231904</URL>
        <Description>SUSE Bug 1231904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="130">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/rtrs-srv: Avoid null pointer deref during path establishment

For RTRS path establishment, RTRS client initiates and completes con_num
of connections. After establishing all its connections, the information
is exchanged between the client and server through the info_req message.
During this exchange, it is essential that all connections have been
established, and the state of the RTRS srv path is CONNECTED.

So add these sanity checks, to make sure we detect and abort process in
error scenarios to avoid null pointer deref.</Note>
    </Notes>
    <CVE>CVE-2024-50062</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50062.html</URL>
        <Description>CVE-2024-50062</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232232</URL>
        <Description>SUSE Bug 1232232</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="131">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

uprobe: avoid out-of-bounds memory access of fetching args

Uprobe needs to fetch args into a percpu buffer, and then copy to ring
buffer to avoid non-atomic context problem.

Sometimes user-space strings, arrays can be very large, but the size of
percpu buffer is only page size. And store_trace_args() won't check
whether these data exceeds a single page or not, caused out-of-bounds
memory access.

It could be reproduced by following steps:
1. build kernel with CONFIG_KASAN enabled
2. save follow program as test.c

```
\#include &lt;stdio.h&gt;
\#include &lt;stdlib.h&gt;
\#include &lt;string.h&gt;

// If string length large than MAX_STRING_SIZE, the fetch_store_strlen()
// will return 0, cause __get_data_size() return shorter size, and
// store_trace_args() will not trigger out-of-bounds access.
// So make string length less than 4096.
\#define STRLEN 4093

void generate_string(char *str, int n)
{
    int i;
    for (i = 0; i &lt; n; ++i)
    {
        char c = i % 26 + 'a';
        str[i] = c;
    }
    str[n-1] = '\0';
}

void print_string(char *str)
{
    printf("%s\n", str);
}

int main()
{
    char tmp[STRLEN];

    generate_string(tmp, STRLEN);
    print_string(tmp);

    return 0;
}
```
3. compile program
`gcc -o test test.c`

4. get the offset of `print_string()`
```
objdump -t test | grep -w print_string
0000000000401199 g     F .text  000000000000001b              print_string
```

5. configure uprobe with offset 0x1199
```
off=0x1199

cd /sys/kernel/debug/tracing/
echo "p /root/test:${off} arg1=+0(%di):ustring arg2=\$comm arg3=+0(%di):ustring"
 &gt; uprobe_events
echo 1 &gt; events/uprobes/enable
echo 1 &gt; tracing_on
```

6. run `test`, and kasan will report error.
==================================================================
BUG: KASAN: use-after-free in strncpy_from_user+0x1d6/0x1f0
Write of size 8 at addr ffff88812311c004 by task test/499CPU: 0 UID: 0 PID: 499 Comm: test Not tainted 6.12.0-rc3+ #18
Hardware name: Red Hat KVM, BIOS 1.16.0-4.al8 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x55/0x70
 print_address_description.constprop.0+0x27/0x310
 kasan_report+0x10f/0x120
 ? strncpy_from_user+0x1d6/0x1f0
 strncpy_from_user+0x1d6/0x1f0
 ? rmqueue.constprop.0+0x70d/0x2ad0
 process_fetch_insn+0xb26/0x1470
 ? __pfx_process_fetch_insn+0x10/0x10
 ? _raw_spin_lock+0x85/0xe0
 ? __pfx__raw_spin_lock+0x10/0x10
 ? __pte_offset_map+0x1f/0x2d0
 ? unwind_next_frame+0xc5f/0x1f80
 ? arch_stack_walk+0x68/0xf0
 ? is_bpf_text_address+0x23/0x30
 ? kernel_text_address.part.0+0xbb/0xd0
 ? __kernel_text_address+0x66/0xb0
 ? unwind_get_return_address+0x5e/0xa0
 ? __pfx_stack_trace_consume_entry+0x10/0x10
 ? arch_stack_walk+0xa2/0xf0
 ? _raw_spin_lock_irqsave+0x8b/0xf0
 ? __pfx__raw_spin_lock_irqsave+0x10/0x10
 ? depot_alloc_stack+0x4c/0x1f0
 ? _raw_spin_unlock_irqrestore+0xe/0x30
 ? stack_depot_save_flags+0x35d/0x4f0
 ? kasan_save_stack+0x34/0x50
 ? kasan_save_stack+0x24/0x50
 ? mutex_lock+0x91/0xe0
 ? __pfx_mutex_lock+0x10/0x10
 prepare_uprobe_buffer.part.0+0x2cd/0x500
 uprobe_dispatcher+0x2c3/0x6a0
 ? __pfx_uprobe_dispatcher+0x10/0x10
 ? __kasan_slab_alloc+0x4d/0x90
 handler_chain+0xdd/0x3e0
 handle_swbp+0x26e/0x3d0
 ? __pfx_handle_swbp+0x10/0x10
 ? uprobe_pre_sstep_notifier+0x151/0x1b0
 irqentry_exit_to_user_mode+0xe2/0x1b0
 asm_exc_int3+0x39/0x40
RIP: 0033:0x401199
Code: 01 c2 0f b6 45 fb 88 02 83 45 fc 01 8b 45 fc 3b 45 e4 7c b7 8b 45 e4 48 98 48 8d 50 ff 48 8b 45 e8 48 01 d0 ce
RSP: 002b:00007ffdf00576a8 EFLAGS: 00000206
RAX: 00007ffdf00576b0 RBX: 0000000000000000 RCX: 0000000000000ff2
RDX: 0000000000000ffc RSI: 0000000000000ffd RDI: 00007ffdf00576b0
RBP: 00007ffdf00586b0 R08: 00007feb2f9c0d20 R09: 00007feb2f9c0d20
R10: 0000000000000001 R11: 0000000000000202 R12: 0000000000401040
R13: 00007ffdf0058780 R14: 0000000000000000 R15: 0000000000000000
 &lt;/TASK&gt;

This commit enforces the buffer's maxlen less than a page-size to avoid
store_trace_args() out-of-memory access.</Note>
    </Notes>
    <CVE>CVE-2024-50067</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50067.html</URL>
        <Description>CVE-2024-50067</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232416</URL>
        <Description>SUSE Bug 1232416</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="132">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tty: n_gsm: Fix use-after-free in gsm_cleanup_mux

BUG: KASAN: slab-use-after-free in gsm_cleanup_mux+0x77b/0x7b0
drivers/tty/n_gsm.c:3160 [n_gsm]
Read of size 8 at addr ffff88815fe99c00 by task poc/3379
CPU: 0 UID: 0 PID: 3379 Comm: poc Not tainted 6.11.0+ #56
Hardware name: VMware, Inc. VMware Virtual Platform/440BX
Desktop Reference Platform, BIOS 6.00 11/12/2020
Call Trace:
 &lt;TASK&gt;
 gsm_cleanup_mux+0x77b/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm]
 __pfx_gsm_cleanup_mux+0x10/0x10 drivers/tty/n_gsm.c:3124 [n_gsm]
 __pfx_sched_clock_cpu+0x10/0x10 kernel/sched/clock.c:389
 update_load_avg+0x1c1/0x27b0 kernel/sched/fair.c:4500
 __pfx_min_vruntime_cb_rotate+0x10/0x10 kernel/sched/fair.c:846
 __rb_insert_augmented+0x492/0xbf0 lib/rbtree.c:161
 gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm]
 _raw_spin_lock_irqsave+0x92/0xf0 arch/x86/include/asm/atomic.h:107
 __pfx_gsmld_ioctl+0x10/0x10 drivers/tty/n_gsm.c:3822 [n_gsm]
 ktime_get+0x5e/0x140 kernel/time/timekeeping.c:195
 ldsem_down_read+0x94/0x4e0 arch/x86/include/asm/atomic64_64.h:79
 __pfx_ldsem_down_read+0x10/0x10 drivers/tty/tty_ldsem.c:338
 __pfx_do_vfs_ioctl+0x10/0x10 fs/ioctl.c:805
 tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818

Allocated by task 65:
 gsm_data_alloc.constprop.0+0x27/0x190 drivers/tty/n_gsm.c:926 [n_gsm]
 gsm_send+0x2c/0x580 drivers/tty/n_gsm.c:819 [n_gsm]
 gsm1_receive+0x547/0xad0 drivers/tty/n_gsm.c:3038 [n_gsm]
 gsmld_receive_buf+0x176/0x280 drivers/tty/n_gsm.c:3609 [n_gsm]
 tty_ldisc_receive_buf+0x101/0x1e0 drivers/tty/tty_buffer.c:391
 tty_port_default_receive_buf+0x61/0xa0 drivers/tty/tty_port.c:39
 flush_to_ldisc+0x1b0/0x750 drivers/tty/tty_buffer.c:445
 process_scheduled_works+0x2b0/0x10d0 kernel/workqueue.c:3229
 worker_thread+0x3dc/0x950 kernel/workqueue.c:3391
 kthread+0x2a3/0x370 kernel/kthread.c:389
 ret_from_fork+0x2d/0x70 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:257

Freed by task 3367:
 kfree+0x126/0x420 mm/slub.c:4580
 gsm_cleanup_mux+0x36c/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm]
 gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm]
 tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818

[Analysis]
gsm_msg on the tx_ctrl_list or tx_data_list of gsm_mux
can be freed by multi threads through ioctl,which leads
to the occurrence of uaf. Protect it by gsm tx lock.</Note>
    </Notes>
    <CVE>CVE-2024-50073</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50073.html</URL>
        <Description>CVE-2024-50073</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225742</URL>
        <Description>SUSE Bug 1225742</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232520</URL>
        <Description>SUSE Bug 1232520</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="133">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

parport: Proper fix for array out-of-bounds access

The recent fix for array out-of-bounds accesses replaced sprintf()
calls blindly with snprintf().  However, since snprintf() returns the
would-be-printed size, not the actually output size, the length
calculation can still go over the given limit.

Use scnprintf() instead of snprintf(), which returns the actually
output letters, for addressing the potential out-of-bounds access
properly.</Note>
    </Notes>
    <CVE>CVE-2024-50074</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50074.html</URL>
        <Description>CVE-2024-50074</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232507</URL>
        <Description>SUSE Bug 1232507</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="134">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: ISO: Fix multiple init when debugfs is disabled

If bt_debugfs is not created successfully, which happens if either
CONFIG_DEBUG_FS or CONFIG_DEBUG_FS_ALLOW_ALL is unset, then iso_init()
returns early and does not set iso_inited to true. This means that a
subsequent call to iso_init() will result in duplicate calls to
proto_register(), bt_sock_register(), etc.

With CONFIG_LIST_HARDENED and CONFIG_BUG_ON_DATA_CORRUPTION enabled, the
duplicate call to proto_register() triggers this BUG():

  list_add double add: new=ffffffffc0b280d0, prev=ffffffffbab56250,
    next=ffffffffc0b280d0.
  ------------[ cut here ]------------
  kernel BUG at lib/list_debug.c:35!
  Oops: invalid opcode: 0000 [#1] PREEMPT SMP PTI
  CPU: 2 PID: 887 Comm: bluetoothd Not tainted 6.10.11-1-ao-desktop #1
  RIP: 0010:__list_add_valid_or_report+0x9a/0xa0
  ...
    __list_add_valid_or_report+0x9a/0xa0
    proto_register+0x2b5/0x340
    iso_init+0x23/0x150 [bluetooth]
    set_iso_socket_func+0x68/0x1b0 [bluetooth]
    kmem_cache_free+0x308/0x330
    hci_sock_sendmsg+0x990/0x9e0 [bluetooth]
    __sock_sendmsg+0x7b/0x80
    sock_write_iter+0x9a/0x110
    do_iter_readv_writev+0x11d/0x220
    vfs_writev+0x180/0x3e0
    do_writev+0xca/0x100
  ...

This change removes the early return. The check for iso_debugfs being
NULL was unnecessary, it is always NULL when iso_inited is false.</Note>
    </Notes>
    <CVE>CVE-2024-50077</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50077.html</URL>
        <Description>CVE-2024-50077</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232504</URL>
        <Description>SUSE Bug 1232504</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="135">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Call iso_exit() on module unload

If iso_init() has been called, iso_exit() must be called on module
unload. Without that, the struct proto that iso_init() registered with
proto_register() becomes invalid, which could cause unpredictable
problems later. In my case, with CONFIG_LIST_HARDENED and
CONFIG_BUG_ON_DATA_CORRUPTION enabled, loading the module again usually
triggers this BUG():

  list_add corruption. next-&gt;prev should be prev (ffffffffb5355fd0),
    but was 0000000000000068. (next=ffffffffc0a010d0).
  ------------[ cut here ]------------
  kernel BUG at lib/list_debug.c:29!
  Oops: invalid opcode: 0000 [#1] PREEMPT SMP PTI
  CPU: 1 PID: 4159 Comm: modprobe Not tainted 6.10.11-4+bt2-ao-desktop #1
  RIP: 0010:__list_add_valid_or_report+0x61/0xa0
  ...
    __list_add_valid_or_report+0x61/0xa0
    proto_register+0x299/0x320
    hci_sock_init+0x16/0xc0 [bluetooth]
    bt_init+0x68/0xd0 [bluetooth]
    __pfx_bt_init+0x10/0x10 [bluetooth]
    do_one_initcall+0x80/0x2f0
    do_init_module+0x8b/0x230
    __do_sys_init_module+0x15f/0x190
    do_syscall_64+0x68/0x110
  ...</Note>
    </Notes>
    <CVE>CVE-2024-50078</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50078.html</URL>
        <Description>CVE-2024-50078</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232503</URL>
        <Description>SUSE Bug 1232503</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="136">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race

We're seeing crashes from rq_qos_wake_function that look like this:

  BUG: unable to handle page fault for address: ffffafe180a40084
  #PF: supervisor write access in kernel mode
  #PF: error_code(0x0002) - not-present page
  PGD 100000067 P4D 100000067 PUD 10027c067 PMD 10115d067 PTE 0
  Oops: Oops: 0002 [#1] PREEMPT SMP PTI
  CPU: 17 UID: 0 PID: 0 Comm: swapper/17 Not tainted 6.12.0-rc3-00013-geca631b8fe80 #11
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
  RIP: 0010:_raw_spin_lock_irqsave+0x1d/0x40
  Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 41 54 9c 41 5c fa 65 ff 05 62 97 30 4c 31 c0 ba 01 00 00 00 &lt;f0&gt; 0f b1 17 75 0a 4c 89 e0 41 5c c3 cc cc cc cc 89 c6 e8 2c 0b 00
  RSP: 0018:ffffafe180580ca0 EFLAGS: 00010046
  RAX: 0000000000000000 RBX: ffffafe180a3f7a8 RCX: 0000000000000011
  RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffffafe180a40084
  RBP: 0000000000000000 R08: 00000000001e7240 R09: 0000000000000011
  R10: 0000000000000028 R11: 0000000000000888 R12: 0000000000000002
  R13: ffffafe180a40084 R14: 0000000000000000 R15: 0000000000000003
  FS:  0000000000000000(0000) GS:ffff9aaf1f280000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: ffffafe180a40084 CR3: 000000010e428002 CR4: 0000000000770ef0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  PKRU: 55555554
  Call Trace:
   &lt;IRQ&gt;
   try_to_wake_up+0x5a/0x6a0
   rq_qos_wake_function+0x71/0x80
   __wake_up_common+0x75/0xa0
   __wake_up+0x36/0x60
   scale_up.part.0+0x50/0x110
   wb_timer_fn+0x227/0x450
   ...

So rq_qos_wake_function() calls wake_up_process(data-&gt;task), which calls
try_to_wake_up(), which faults in raw_spin_lock_irqsave(&amp;p-&gt;pi_lock).

p comes from data-&gt;task, and data comes from the waitqueue entry, which
is stored on the waiter's stack in rq_qos_wait(). Analyzing the core
dump with drgn, I found that the waiter had already woken up and moved
on to a completely unrelated code path, clobbering what was previously
data-&gt;task. Meanwhile, the waker was passing the clobbered garbage in
data-&gt;task to wake_up_process(), leading to the crash.

What's happening is that in between rq_qos_wake_function() deleting the
waitqueue entry and calling wake_up_process(), rq_qos_wait() is finding
that it already got a token and returning. The race looks like this:

rq_qos_wait()                           rq_qos_wake_function()
==============================================================
prepare_to_wait_exclusive()
                                        data-&gt;got_token = true;
                                        list_del_init(&amp;curr-&gt;entry);
if (data.got_token)
        break;
finish_wait(&amp;rqw-&gt;wait, &amp;data.wq);
  ^- returns immediately because
     list_empty_careful(&amp;wq_entry-&gt;entry)
     is true
... return, go do something else ...
                                        wake_up_process(data-&gt;task)
                                          (NO LONGER VALID!)-^

Normally, finish_wait() is supposed to synchronize against the waker.
But, as noted above, it is returning immediately because the waitqueue
entry has already been removed from the waitqueue.

The bug is that rq_qos_wake_function() is accessing the waitqueue entry
AFTER deleting it. Note that autoremove_wake_function() wakes the waiter
and THEN deletes the waitqueue entry, which is the proper order.

Fix it by swapping the order. We also need to use
list_del_init_careful() to match the list_empty_careful() in
finish_wait().</Note>
    </Notes>
    <CVE>CVE-2024-50082</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50082.html</URL>
        <Description>CVE-2024-50082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232500</URL>
        <Description>SUSE Bug 1232500</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="137">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.</Note>
    </Notes>
    <CVE>CVE-2024-50089</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50089.html</URL>
        <Description>CVE-2024-50089</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232860</URL>
        <Description>SUSE Bug 1232860</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233250</URL>
        <Description>SUSE Bug 1233250</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="138">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

thermal: intel: int340x: processor: Fix warning during module unload

The processor_thermal driver uses pcim_device_enable() to enable a PCI
device, which means the device will be automatically disabled on driver
detach.  Thus there is no need to call pci_disable_device() again on it.

With recent PCI device resource management improvements, e.g. commit
f748a07a0b64 ("PCI: Remove legacy pcim_release()"), this problem is
exposed and triggers the warining below.

 [  224.010735] proc_thermal_pci 0000:00:04.0: disabling already-disabled device
 [  224.010747] WARNING: CPU: 8 PID: 4442 at drivers/pci/pci.c:2250 pci_disable_device+0xe5/0x100
 ...
 [  224.010844] Call Trace:
 [  224.010845]  &lt;TASK&gt;
 [  224.010847]  ? show_regs+0x6d/0x80
 [  224.010851]  ? __warn+0x8c/0x140
 [  224.010854]  ? pci_disable_device+0xe5/0x100
 [  224.010856]  ? report_bug+0x1c9/0x1e0
 [  224.010859]  ? handle_bug+0x46/0x80
 [  224.010862]  ? exc_invalid_op+0x1d/0x80
 [  224.010863]  ? asm_exc_invalid_op+0x1f/0x30
 [  224.010867]  ? pci_disable_device+0xe5/0x100
 [  224.010869]  ? pci_disable_device+0xe5/0x100
 [  224.010871]  ? kfree+0x21a/0x2b0
 [  224.010873]  pcim_disable_device+0x20/0x30
 [  224.010875]  devm_action_release+0x16/0x20
 [  224.010878]  release_nodes+0x47/0xc0
 [  224.010880]  devres_release_all+0x9f/0xe0
 [  224.010883]  device_unbind_cleanup+0x12/0x80
 [  224.010885]  device_release_driver_internal+0x1ca/0x210
 [  224.010887]  driver_detach+0x4e/0xa0
 [  224.010889]  bus_remove_driver+0x6f/0xf0
 [  224.010890]  driver_unregister+0x35/0x60
 [  224.010892]  pci_unregister_driver+0x44/0x90
 [  224.010894]  proc_thermal_pci_driver_exit+0x14/0x5f0 [processor_thermal_device_pci]
 ...
 [  224.010921] ---[ end trace 0000000000000000 ]---

Remove the excess pci_disable_device() calls.

[ rjw: Subject and changelog edits ]</Note>
    </Notes>
    <CVE>CVE-2024-50093</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50093.html</URL>
        <Description>CVE-2024-50093</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232877</URL>
        <Description>SUSE Bug 1232877</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="139">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/mad: Improve handling of timed out WRs of mad agent

Current timeout handler of mad agent acquires/releases mad_agent_priv
lock for every timed out WRs. This causes heavy locking contention
when higher no. of WRs are to be handled inside timeout handler.

This leads to softlockup with below trace in some use cases where
rdma-cm path is used to establish connection between peer nodes

Trace:
-----
 BUG: soft lockup - CPU#4 stuck for 26s! [kworker/u128:3:19767]
 CPU: 4 PID: 19767 Comm: kworker/u128:3 Kdump: loaded Tainted: G OE
     -------  ---  5.14.0-427.13.1.el9_4.x86_64 #1
 Hardware name: Dell Inc. PowerEdge R740/01YM03, BIOS 2.4.8 11/26/2019
 Workqueue: ib_mad1 timeout_sends [ib_core]
 RIP: 0010:__do_softirq+0x78/0x2ac
 RSP: 0018:ffffb253449e4f98 EFLAGS: 00000246
 RAX: 00000000ffffffff RBX: 0000000000000000 RCX: 000000000000001f
 RDX: 000000000000001d RSI: 000000003d1879ab RDI: fff363b66fd3a86b
 RBP: ffffb253604cbcd8 R08: 0000009065635f3b R09: 0000000000000000
 R10: 0000000000000040 R11: ffffb253449e4ff8 R12: 0000000000000000
 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000040
 FS:  0000000000000000(0000) GS:ffff8caa1fc80000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 00007fd9ec9db900 CR3: 0000000891934006 CR4: 00000000007706e0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 PKRU: 55555554
 Call Trace:
  &lt;IRQ&gt;
  ? show_trace_log_lvl+0x1c4/0x2df
  ? show_trace_log_lvl+0x1c4/0x2df
  ? __irq_exit_rcu+0xa1/0xc0
  ? watchdog_timer_fn+0x1b2/0x210
  ? __pfx_watchdog_timer_fn+0x10/0x10
  ? __hrtimer_run_queues+0x127/0x2c0
  ? hrtimer_interrupt+0xfc/0x210
  ? __sysvec_apic_timer_interrupt+0x5c/0x110
  ? sysvec_apic_timer_interrupt+0x37/0x90
  ? asm_sysvec_apic_timer_interrupt+0x16/0x20
  ? __do_softirq+0x78/0x2ac
  ? __do_softirq+0x60/0x2ac
  __irq_exit_rcu+0xa1/0xc0
  sysvec_call_function_single+0x72/0x90
  &lt;/IRQ&gt;
  &lt;TASK&gt;
  asm_sysvec_call_function_single+0x16/0x20
 RIP: 0010:_raw_spin_unlock_irq+0x14/0x30
 RSP: 0018:ffffb253604cbd88 EFLAGS: 00000247
 RAX: 000000000001960d RBX: 0000000000000002 RCX: ffff8cad2a064800
 RDX: 000000008020001b RSI: 0000000000000001 RDI: ffff8cad5d39f66c
 RBP: ffff8cad5d39f600 R08: 0000000000000001 R09: 0000000000000000
 R10: ffff8caa443e0c00 R11: ffffb253604cbcd8 R12: ffff8cacb8682538
 R13: 0000000000000005 R14: ffffb253604cbd90 R15: ffff8cad5d39f66c
  cm_process_send_error+0x122/0x1d0 [ib_cm]
  timeout_sends+0x1dd/0x270 [ib_core]
  process_one_work+0x1e2/0x3b0
  ? __pfx_worker_thread+0x10/0x10
  worker_thread+0x50/0x3a0
  ? __pfx_worker_thread+0x10/0x10
  kthread+0xdd/0x100
  ? __pfx_kthread+0x10/0x10
  ret_from_fork+0x29/0x50
  &lt;/TASK&gt;

Simplified timeout handler by creating local list of timed out WRs
and invoke send handler post creating the list. The new method acquires/
releases lock once to fetch the list and hence helps to reduce locking
contetiong when processing higher no. of WRs</Note>
    </Notes>
    <CVE>CVE-2024-50095</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50095.html</URL>
        <Description>CVE-2024-50095</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232873</URL>
        <Description>SUSE Bug 1232873</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="140">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error

The `nouveau_dmem_copy_one` function ensures that the copy push command is
sent to the device firmware but does not track whether it was executed
successfully.

In the case of a copy error (e.g., firmware or hardware failure), the
copy push command will be sent via the firmware channel, and
`nouveau_dmem_copy_one` will likely report success, leading to the
`migrate_to_ram` function returning a dirty HIGH_USER page to the user.

This can result in a security vulnerability, as a HIGH_USER page that may
contain sensitive or corrupted data could be returned to the user.

To prevent this vulnerability, we allocate a zero page. Thus, in case of
an error, a non-dirty (zero) page will be returned to the user.</Note>
    </Notes>
    <CVE>CVE-2024-50096</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50096.html</URL>
        <Description>CVE-2024-50096</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232870</URL>
        <Description>SUSE Bug 1232870</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="141">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down

There is a history of deadlock if reboot is performed at the beginning
of booting. SDEV_QUIESCE was set for all LU's scsi_devices by UFS
shutdown, and at that time the audio driver was waiting on
blk_mq_submit_bio() holding a mutex_lock while reading the fw binary.
After that, a deadlock issue occurred while audio driver shutdown was
waiting for mutex_unlock of blk_mq_submit_bio(). To solve this, set
SDEV_OFFLINE for all LUs except WLUN, so that any I/O that comes down
after a UFS shutdown will return an error.

[   31.907781]I[0:      swapper/0:    0]        1        130705007       1651079834      11289729804                0 D(   2) 3 ffffff882e208000 *             init [device_shutdown]
[   31.907793]I[0:      swapper/0:    0] Mutex: 0xffffff8849a2b8b0: owner[0xffffff882e28cb00 kworker/6:0 :49]
[   31.907806]I[0:      swapper/0:    0] Call trace:
[   31.907810]I[0:      swapper/0:    0]  __switch_to+0x174/0x338
[   31.907819]I[0:      swapper/0:    0]  __schedule+0x5ec/0x9cc
[   31.907826]I[0:      swapper/0:    0]  schedule+0x7c/0xe8
[   31.907834]I[0:      swapper/0:    0]  schedule_preempt_disabled+0x24/0x40
[   31.907842]I[0:      swapper/0:    0]  __mutex_lock+0x408/0xdac
[   31.907849]I[0:      swapper/0:    0]  __mutex_lock_slowpath+0x14/0x24
[   31.907858]I[0:      swapper/0:    0]  mutex_lock+0x40/0xec
[   31.907866]I[0:      swapper/0:    0]  device_shutdown+0x108/0x280
[   31.907875]I[0:      swapper/0:    0]  kernel_restart+0x4c/0x11c
[   31.907883]I[0:      swapper/0:    0]  __arm64_sys_reboot+0x15c/0x280
[   31.907890]I[0:      swapper/0:    0]  invoke_syscall+0x70/0x158
[   31.907899]I[0:      swapper/0:    0]  el0_svc_common+0xb4/0xf4
[   31.907909]I[0:      swapper/0:    0]  do_el0_svc+0x2c/0xb0
[   31.907918]I[0:      swapper/0:    0]  el0_svc+0x34/0xe0
[   31.907928]I[0:      swapper/0:    0]  el0t_64_sync_handler+0x68/0xb4
[   31.907937]I[0:      swapper/0:    0]  el0t_64_sync+0x1a0/0x1a4

[   31.908774]I[0:      swapper/0:    0]       49                0         11960702      11236868007                0 D(   2) 6 ffffff882e28cb00 *      kworker/6:0 [__bio_queue_enter]
[   31.908783]I[0:      swapper/0:    0] Call trace:
[   31.908788]I[0:      swapper/0:    0]  __switch_to+0x174/0x338
[   31.908796]I[0:      swapper/0:    0]  __schedule+0x5ec/0x9cc
[   31.908803]I[0:      swapper/0:    0]  schedule+0x7c/0xe8
[   31.908811]I[0:      swapper/0:    0]  __bio_queue_enter+0xb8/0x178
[   31.908818]I[0:      swapper/0:    0]  blk_mq_submit_bio+0x194/0x67c
[   31.908827]I[0:      swapper/0:    0]  __submit_bio+0xb8/0x19c</Note>
    </Notes>
    <CVE>CVE-2024-50098</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50098.html</URL>
        <Description>CVE-2024-50098</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232881</URL>
        <Description>SUSE Bug 1232881</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="142">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

arm64: probes: Remove broken LDR (literal) uprobe support

The simulate_ldr_literal() and simulate_ldrsw_literal() functions are
unsafe to use for uprobes. Both functions were originally written for
use with kprobes, and access memory with plain C accesses. When uprobes
was added, these were reused unmodified even though they cannot safely
access user memory.

There are three key problems:

1) The plain C accesses do not have corresponding extable entries, and
   thus if they encounter a fault the kernel will treat these as
   unintentional accesses to user memory, resulting in a BUG() which
   will kill the kernel thread, and likely lead to further issues (e.g.
   lockup or panic()).

2) The plain C accesses are subject to HW PAN and SW PAN, and so when
   either is in use, any attempt to simulate an access to user memory
   will fault. Thus neither simulate_ldr_literal() nor
   simulate_ldrsw_literal() can do anything useful when simulating a
   user instruction on any system with HW PAN or SW PAN.

3) The plain C accesses are privileged, as they run in kernel context,
   and in practice can access a small range of kernel virtual addresses.
   The instructions they simulate have a range of +/-1MiB, and since the
   simulated instructions must itself be a user instructions in the
   TTBR0 address range, these can address the final 1MiB of the TTBR1
   acddress range by wrapping downwards from an address in the first
   1MiB of the TTBR0 address range.

   In contemporary kernels the last 8MiB of TTBR1 address range is
   reserved, and accesses to this will always fault, meaning this is no
   worse than (1).

   Historically, it was theoretically possible for the linear map or
   vmemmap to spill into the final 8MiB of the TTBR1 address range, but
   in practice this is extremely unlikely to occur as this would
   require either:

   * Having enough physical memory to fill the entire linear map all the
     way to the final 1MiB of the TTBR1 address range.

   * Getting unlucky with KASLR randomization of the linear map such
     that the populated region happens to overlap with the last 1MiB of
     the TTBR address range.

   ... and in either case if we were to spill into the final page there
   would be larger problems as the final page would alias with error
   pointers.

Practically speaking, (1) and (2) are the big issues. Given there have
been no reports of problems since the broken code was introduced, it
appears that no-one is relying on probing these instructions with
uprobes.

Avoid these issues by not allowing uprobes on LDR (literal) and LDRSW
(literal), limiting the use of simulate_ldr_literal() and
simulate_ldrsw_literal() to kprobes. Attempts to place uprobes on LDR
(literal) and LDRSW (literal) will be rejected as
arm_probe_decode_insn() will return INSN_REJECTED. In future we can
consider introducing working uprobes support for these instructions, but
this will require more significant work.</Note>
    </Notes>
    <CVE>CVE-2024-50099</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50099.html</URL>
        <Description>CVE-2024-50099</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232887</URL>
        <Description>SUSE Bug 1232887</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="143">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe()

A devm_kzalloc() in asoc_qcom_lpass_cpu_platform_probe() could
possibly return NULL pointer. NULL Pointer Dereference may be
triggerred without addtional check.
Add a NULL check for the returned pointer.</Note>
    </Notes>
    <CVE>CVE-2024-50103</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50103.html</URL>
        <Description>CVE-2024-50103</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232878</URL>
        <Description>SUSE Bug 1232878</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="144">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too

Stuart Hayhurst has found that both at bootup and fullscreen VA-API video
is leading to black screens for around 1 second and kernel WARNING [1] traces
when calling dmub_psr_enable() with Parade 08-01 TCON.

These symptoms all go away with PSR-SU disabled for this TCON, so disable
it for now while DMUB traces [2] from the failure can be analyzed and the failure
state properly root caused.

(cherry picked from commit afb634a6823d8d9db23c5fb04f79c5549349628b)</Note>
    </Notes>
    <CVE>CVE-2024-50108</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50108.html</URL>
        <Description>CVE-2024-50108</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232884</URL>
        <Description>SUSE Bug 1232884</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="145">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

xfrm: fix one more kernel-infoleak in algo dumping

During fuzz testing, the following issue was discovered:

BUG: KMSAN: kernel-infoleak in _copy_to_iter+0x598/0x2a30
 _copy_to_iter+0x598/0x2a30
 __skb_datagram_iter+0x168/0x1060
 skb_copy_datagram_iter+0x5b/0x220
 netlink_recvmsg+0x362/0x1700
 sock_recvmsg+0x2dc/0x390
 __sys_recvfrom+0x381/0x6d0
 __x64_sys_recvfrom+0x130/0x200
 x64_sys_call+0x32c8/0x3cc0
 do_syscall_64+0xd8/0x1c0
 entry_SYSCALL_64_after_hwframe+0x79/0x81

Uninit was stored to memory at:
 copy_to_user_state_extra+0xcc1/0x1e00
 dump_one_state+0x28c/0x5f0
 xfrm_state_walk+0x548/0x11e0
 xfrm_dump_sa+0x1e0/0x840
 netlink_dump+0x943/0x1c40
 __netlink_dump_start+0x746/0xdb0
 xfrm_user_rcv_msg+0x429/0xc00
 netlink_rcv_skb+0x613/0x780
 xfrm_netlink_rcv+0x77/0xc0
 netlink_unicast+0xe90/0x1280
 netlink_sendmsg+0x126d/0x1490
 __sock_sendmsg+0x332/0x3d0
 ____sys_sendmsg+0x863/0xc30
 ___sys_sendmsg+0x285/0x3e0
 __x64_sys_sendmsg+0x2d6/0x560
 x64_sys_call+0x1316/0x3cc0
 do_syscall_64+0xd8/0x1c0
 entry_SYSCALL_64_after_hwframe+0x79/0x81

Uninit was created at:
 __kmalloc+0x571/0xd30
 attach_auth+0x106/0x3e0
 xfrm_add_sa+0x2aa0/0x4230
 xfrm_user_rcv_msg+0x832/0xc00
 netlink_rcv_skb+0x613/0x780
 xfrm_netlink_rcv+0x77/0xc0
 netlink_unicast+0xe90/0x1280
 netlink_sendmsg+0x126d/0x1490
 __sock_sendmsg+0x332/0x3d0
 ____sys_sendmsg+0x863/0xc30
 ___sys_sendmsg+0x285/0x3e0
 __x64_sys_sendmsg+0x2d6/0x560
 x64_sys_call+0x1316/0x3cc0
 do_syscall_64+0xd8/0x1c0
 entry_SYSCALL_64_after_hwframe+0x79/0x81

Bytes 328-379 of 732 are uninitialized
Memory access of size 732 starts at ffff88800e18e000
Data copied to user address 00007ff30f48aff0

CPU: 2 PID: 18167 Comm: syz-executor.0 Not tainted 6.8.11 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014

Fixes copying of xfrm algorithms where some random
data of the structure fields can end up in userspace.
Padding in structures may be filled with random (possibly sensitve)
data and should never be given directly to user-space.

A similar issue was resolved in the commit
8222d5910dae ("xfrm: Zero padding when dumping algos and encap")

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.</Note>
    </Notes>
    <CVE>CVE-2024-50110</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50110.html</URL>
        <Description>CVE-2024-50110</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232885</URL>
        <Description>SUSE Bug 1232885</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="146">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory

Ignore nCR3[4:0] when loading PDPTEs from memory for nested SVM, as bits
4:0 of CR3 are ignored when PAE paging is used, and thus VMRUN doesn't
enforce 32-byte alignment of nCR3.

In the absolute worst case scenario, failure to ignore bits 4:0 can result
in an out-of-bounds read, e.g. if the target page is at the end of a
memslot, and the VMM isn't using guard pages.

Per the APM:

  The CR3 register points to the base address of the page-directory-pointer
  table. The page-directory-pointer table is aligned on a 32-byte boundary,
  with the low 5 address bits 4:0 assumed to be 0.

And the SDM's much more explicit:

  4:0    Ignored

Note, KVM gets this right when loading PDPTRs, it's only the nSVM flow
that is broken.</Note>
    </Notes>
    <CVE>CVE-2024-50115</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50115.html</URL>
        <Description>CVE-2024-50115</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225742</URL>
        <Description>SUSE Bug 1225742</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232919</URL>
        <Description>SUSE Bug 1232919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233019</URL>
        <Description>SUSE Bug 1233019</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="147">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix kernel bug due to missing clearing of buffer delay flag

Syzbot reported that after nilfs2 reads a corrupted file system image
and degrades to read-only, the BUG_ON check for the buffer delay flag
in submit_bh_wbc() may fail, causing a kernel bug.

This is because the buffer delay flag is not cleared when clearing the
buffer state flags to discard a page/folio or a buffer head. So, fix
this.

This became necessary when the use of nilfs2's own page clear routine
was expanded.  This state inconsistency does not occur if the buffer
is written normally by log writing.</Note>
    </Notes>
    <CVE>CVE-2024-50116</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50116.html</URL>
        <Description>CVE-2024-50116</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232892</URL>
        <Description>SUSE Bug 1232892</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="148">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amd: Guard against bad data for ATIF ACPI method

If a BIOS provides bad data in response to an ATIF method call
this causes a NULL pointer dereference in the caller.

```
? show_regs (arch/x86/kernel/dumpstack.c:478 (discriminator 1))
? __die (arch/x86/kernel/dumpstack.c:423 arch/x86/kernel/dumpstack.c:434)
? page_fault_oops (arch/x86/mm/fault.c:544 (discriminator 2) arch/x86/mm/fault.c:705 (discriminator 2))
? do_user_addr_fault (arch/x86/mm/fault.c:440 (discriminator 1) arch/x86/mm/fault.c:1232 (discriminator 1))
? acpi_ut_update_object_reference (drivers/acpi/acpica/utdelete.c:642)
? exc_page_fault (arch/x86/mm/fault.c:1542)
? asm_exc_page_fault (./arch/x86/include/asm/idtentry.h:623)
? amdgpu_atif_query_backlight_caps.constprop.0 (drivers/gpu/drm/amd/amdgpu/amdgpu_acpi.c:387 (discriminator 2)) amdgpu
? amdgpu_atif_query_backlight_caps.constprop.0 (drivers/gpu/drm/amd/amdgpu/amdgpu_acpi.c:386 (discriminator 1)) amdgpu
```

It has been encountered on at least one system, so guard for it.

(cherry picked from commit c9b7c809b89f24e9372a4e7f02d64c950b07fdee)</Note>
    </Notes>
    <CVE>CVE-2024-50117</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50117.html</URL>
        <Description>CVE-2024-50117</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232897</URL>
        <Description>SUSE Bug 1232897</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="149">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: ISO: Fix UAF on iso_sock_timeout

conn-&gt;sk maybe have been unlinked/freed while waiting for iso_conn_lock
so this checks if the conn-&gt;sk is still valid by checking if it part of
iso_sk_list.</Note>
    </Notes>
    <CVE>CVE-2024-50124</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50124.html</URL>
        <Description>CVE-2024-50124</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232926</URL>
        <Description>SUSE Bug 1232926</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232927</URL>
        <Description>SUSE Bug 1232927</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="150">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: SCO: Fix UAF on sco_sock_timeout

conn-&gt;sk maybe have been unlinked/freed while waiting for sco_conn_lock
so this checks if the conn-&gt;sk is still valid by checking if it part of
sco_sk_list.</Note>
    </Notes>
    <CVE>CVE-2024-50125</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50125.html</URL>
        <Description>CVE-2024-50125</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232928</URL>
        <Description>SUSE Bug 1232928</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232929</URL>
        <Description>SUSE Bug 1232929</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="151">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: sched: fix use-after-free in taprio_change()

In 'taprio_change()', 'admin' pointer may become dangling due to sched
switch / removal caused by 'advance_sched()', and critical section
protected by 'q-&gt;current_entry_lock' is too small to prevent from such
a scenario (which causes use-after-free detected by KASAN). Fix this
by prefer 'rcu_replace_pointer()' over 'rcu_assign_pointer()' to update
'admin' immediately before an attempt to schedule freeing.</Note>
    </Notes>
    <CVE>CVE-2024-50127</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50127.html</URL>
        <Description>CVE-2024-50127</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232907</URL>
        <Description>SUSE Bug 1232907</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232908</URL>
        <Description>SUSE Bug 1232908</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="152">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: wwan: fix global oob in wwan_rtnl_policy

The variable wwan_rtnl_link_ops assign a *bigger* maxtype which leads to
a global out-of-bounds read when parsing the netlink attributes. Exactly
same bug cause as the oob fixed in commit b33fb5b801c6 ("net: qualcomm:
rmnet: fix global oob in rmnet_policy").

==================================================================
BUG: KASAN: global-out-of-bounds in validate_nla lib/nlattr.c:388 [inline]
BUG: KASAN: global-out-of-bounds in __nla_validate_parse+0x19d7/0x29a0 lib/nlattr.c:603
Read of size 1 at addr ffffffff8b09cb60 by task syz.1.66276/323862

CPU: 0 PID: 323862 Comm: syz.1.66276 Not tainted 6.1.70 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x177/0x231 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:284 [inline]
 print_report+0x14f/0x750 mm/kasan/report.c:395
 kasan_report+0x139/0x170 mm/kasan/report.c:495
 validate_nla lib/nlattr.c:388 [inline]
 __nla_validate_parse+0x19d7/0x29a0 lib/nlattr.c:603
 __nla_parse+0x3c/0x50 lib/nlattr.c:700
 nla_parse_nested_deprecated include/net/netlink.h:1269 [inline]
 __rtnl_newlink net/core/rtnetlink.c:3514 [inline]
 rtnl_newlink+0x7bc/0x1fd0 net/core/rtnetlink.c:3623
 rtnetlink_rcv_msg+0x794/0xef0 net/core/rtnetlink.c:6122
 netlink_rcv_skb+0x1de/0x420 net/netlink/af_netlink.c:2508
 netlink_unicast_kernel net/netlink/af_netlink.c:1326 [inline]
 netlink_unicast+0x74b/0x8c0 net/netlink/af_netlink.c:1352
 netlink_sendmsg+0x882/0xb90 net/netlink/af_netlink.c:1874
 sock_sendmsg_nosec net/socket.c:716 [inline]
 __sock_sendmsg net/socket.c:728 [inline]
 ____sys_sendmsg+0x5cc/0x8f0 net/socket.c:2499
 ___sys_sendmsg+0x21c/0x290 net/socket.c:2553
 __sys_sendmsg net/socket.c:2582 [inline]
 __do_sys_sendmsg net/socket.c:2591 [inline]
 __se_sys_sendmsg+0x19e/0x270 net/socket.c:2589
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x45/0x90 arch/x86/entry/common.c:81
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f67b19a24ad
RSP: 002b:00007f67b17febb8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007f67b1b45f80 RCX: 00007f67b19a24ad
RDX: 0000000000000000 RSI: 0000000020005e40 RDI: 0000000000000004
RBP: 00007f67b1a1e01d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffd2513764f R14: 00007ffd251376e0 R15: 00007f67b17fed40
 &lt;/TASK&gt;

The buggy address belongs to the variable:
 wwan_rtnl_policy+0x20/0x40

The buggy address belongs to the physical page:
page:ffffea00002c2700 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xb09c
flags: 0xfff00000001000(reserved|node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000001000 ffffea00002c2708 ffffea00002c2708 0000000000000000
raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner info is not present (never set?)

Memory state around the buggy address:
 ffffffff8b09ca00: 05 f9 f9 f9 05 f9 f9 f9 00 01 f9 f9 00 01 f9 f9
 ffffffff8b09ca80: 00 00 00 05 f9 f9 f9 f9 00 00 03 f9 f9 f9 f9 f9
&gt;ffffffff8b09cb00: 00 00 00 00 05 f9 f9 f9 00 00 00 00 f9 f9 f9 f9
                                                       ^
 ffffffff8b09cb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
==================================================================

According to the comment of `nla_parse_nested_deprecated`, use correct size
`IFLA_WWAN_MAX` here to fix this issue.</Note>
    </Notes>
    <CVE>CVE-2024-50128</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50128.html</URL>
        <Description>CVE-2024-50128</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232905</URL>
        <Description>SUSE Bug 1232905</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="153">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tracing: Consider the NULL character when validating the event length

strlen() returns a string length excluding the null byte. If the string
length equals to the maximum buffer length, the buffer will have no
space for the NULL terminating character.

This commit checks this condition and returns failure for it.</Note>
    </Notes>
    <CVE>CVE-2024-50131</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50131.html</URL>
        <Description>CVE-2024-50131</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232896</URL>
        <Description>SUSE Bug 1232896</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="154">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA

Replace the fake VLA at end of the vbva_mouse_pointer_shape shape with
a real VLA to fix a "memcpy: detected field-spanning write error" warning:

[   13.319813] memcpy: detected field-spanning write (size 16896) of single field "p-&gt;data" at drivers/gpu/drm/vboxvideo/hgsmi_base.c:154 (size 4)
[   13.319841] WARNING: CPU: 0 PID: 1105 at drivers/gpu/drm/vboxvideo/hgsmi_base.c:154 hgsmi_update_pointer_shape+0x192/0x1c0 [vboxvideo]
[   13.320038] Call Trace:
[   13.320173]  hgsmi_update_pointer_shape [vboxvideo]
[   13.320184]  vbox_cursor_atomic_update [vboxvideo]

Note as mentioned in the added comment it seems the original length
calculation for the allocated and send hgsmi buffer is 4 bytes too large.
Changing this is not the goal of this patch, so this behavior is kept.</Note>
    </Notes>
    <CVE>CVE-2024-50134</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50134.html</URL>
        <Description>CVE-2024-50134</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232890</URL>
        <Description>SUSE Bug 1232890</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="155">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nvme-pci: fix race condition between reset and nvme_dev_disable()

nvme_dev_disable() modifies the dev-&gt;online_queues field, therefore
nvme_pci_update_nr_queues() should avoid racing against it, otherwise
we could end up passing invalid values to blk_mq_update_nr_hw_queues().

 WARNING: CPU: 39 PID: 61303 at drivers/pci/msi/api.c:347
          pci_irq_get_affinity+0x187/0x210
 Workqueue: nvme-reset-wq nvme_reset_work [nvme]
 RIP: 0010:pci_irq_get_affinity+0x187/0x210
 Call Trace:
  &lt;TASK&gt;
  ? blk_mq_pci_map_queues+0x87/0x3c0
  ? pci_irq_get_affinity+0x187/0x210
  blk_mq_pci_map_queues+0x87/0x3c0
  nvme_pci_map_queues+0x189/0x460 [nvme]
  blk_mq_update_nr_hw_queues+0x2a/0x40
  nvme_reset_work+0x1be/0x2a0 [nvme]

Fix the bug by locking the shutdown_lock mutex before using
dev-&gt;online_queues. Give up if nvme_dev_disable() is running or if
it has been executed already.</Note>
    </Notes>
    <CVE>CVE-2024-50135</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50135.html</URL>
        <Description>CVE-2024-50135</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232888</URL>
        <Description>SUSE Bug 1232888</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="156">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

bpf: Use raw_spinlock_t in ringbuf

The function __bpf_ringbuf_reserve is invoked from a tracepoint, which
disables preemption. Using spinlock_t in this context can lead to a
"sleep in atomic" warning in the RT variant. This issue is illustrated
in the example below:

BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 556208, name: test_progs
preempt_count: 1, expected: 0
RCU nest depth: 1, expected: 1
INFO: lockdep is turned off.
Preemption disabled at:
[&lt;ffffd33a5c88ea44&gt;] migrate_enable+0xc0/0x39c
CPU: 7 PID: 556208 Comm: test_progs Tainted: G
Hardware name: Qualcomm SA8775P Ride (DT)
Call trace:
 dump_backtrace+0xac/0x130
 show_stack+0x1c/0x30
 dump_stack_lvl+0xac/0xe8
 dump_stack+0x18/0x30
 __might_resched+0x3bc/0x4fc
 rt_spin_lock+0x8c/0x1a4
 __bpf_ringbuf_reserve+0xc4/0x254
 bpf_ringbuf_reserve_dynptr+0x5c/0xdc
 bpf_prog_ac3d15160d62622a_test_read_write+0x104/0x238
 trace_call_bpf+0x238/0x774
 perf_call_bpf_enter.isra.0+0x104/0x194
 perf_syscall_enter+0x2f8/0x510
 trace_sys_enter+0x39c/0x564
 syscall_trace_enter+0x220/0x3c0
 do_el0_svc+0x138/0x1dc
 el0_svc+0x54/0x130
 el0t_64_sync_handler+0x134/0x150
 el0t_64_sync+0x17c/0x180

Switch the spinlock to raw_spinlock_t to avoid this error.</Note>
    </Notes>
    <CVE>CVE-2024-50138</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50138.html</URL>
        <Description>CVE-2024-50138</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232935</URL>
        <Description>SUSE Bug 1232935</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="157">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context

PRMT needs to find the correct type of block to translate the PA-VA
mapping for EFI runtime services.

The issue arises because the PRMT is finding a block of type
EFI_CONVENTIONAL_MEMORY, which is not appropriate for runtime services
as described in Section 2.2.2 (Runtime Services) of the UEFI
Specification [1]. Since the PRM handler is a type of runtime service,
this causes an exception when the PRM handler is called.

    [Firmware Bug]: Unable to handle paging request in EFI runtime service
    WARNING: CPU: 22 PID: 4330 at drivers/firmware/efi/runtime-wrappers.c:341
        __efi_queue_work+0x11c/0x170
    Call trace:

Let PRMT find a block with EFI_MEMORY_RUNTIME for PRM handler and PRM
context.

If no suitable block is found, a warning message will be printed, but
the procedure continues to manage the next PRM handler.

However, if the PRM handler is actually called without proper allocation,
it would result in a failure during error handling.

By using the correct memory types for runtime services, ensure that the
PRM handler and the context are properly mapped in the virtual address
space during runtime, preventing the paging request error.

The issue is really that only memory that has been remapped for runtime
by the firmware can be used by the PRM handler, and so the region needs
to have the EFI_MEMORY_RUNTIME attribute.

[ rjw: Subject and changelog edits ]</Note>
    </Notes>
    <CVE>CVE-2024-50141</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50141.html</URL>
        <Description>CVE-2024-50141</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233065</URL>
        <Description>SUSE Bug 1233065</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="158">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Don't call cleanup on profile rollback failure

When profile rollback fails in mlx5e_netdev_change_profile, the netdev
profile var is left set to NULL. Avoid a crash when unloading the driver
by not calling profile-&gt;cleanup in such a case.

This was encountered while testing, with the original trigger that
the wq rescuer thread creation got interrupted (presumably due to
Ctrl+C-ing modprobe), which gets converted to ENOMEM (-12) by
mlx5e_priv_init, the profile rollback also fails for the same reason
(signal still active) so the profile is left as NULL, leading to a crash
later in _mlx5e_remove.

 [  732.473932] mlx5_core 0000:08:00.1: E-Switch: Unload vfs: mode(OFFLOADS), nvfs(2), necvfs(0), active vports(2)
 [  734.525513] workqueue: Failed to create a rescuer kthread for wq "mlx5e": -EINTR
 [  734.557372] mlx5_core 0000:08:00.1: mlx5e_netdev_init_profile:6235:(pid 6086): mlx5e_priv_init failed, err=-12
 [  734.559187] mlx5_core 0000:08:00.1 eth3: mlx5e_netdev_change_profile: new profile init failed, -12
 [  734.560153] workqueue: Failed to create a rescuer kthread for wq "mlx5e": -EINTR
 [  734.589378] mlx5_core 0000:08:00.1: mlx5e_netdev_init_profile:6235:(pid 6086): mlx5e_priv_init failed, err=-12
 [  734.591136] mlx5_core 0000:08:00.1 eth3: mlx5e_netdev_change_profile: failed to rollback to orig profile, -12
 [  745.537492] BUG: kernel NULL pointer dereference, address: 0000000000000008
 [  745.538222] #PF: supervisor read access in kernel mode
&lt;snipped&gt;
 [  745.551290] Call Trace:
 [  745.551590]  &lt;TASK&gt;
 [  745.551866]  ? __die+0x20/0x60
 [  745.552218]  ? page_fault_oops+0x150/0x400
 [  745.555307]  ? exc_page_fault+0x79/0x240
 [  745.555729]  ? asm_exc_page_fault+0x22/0x30
 [  745.556166]  ? mlx5e_remove+0x6b/0xb0 [mlx5_core]
 [  745.556698]  auxiliary_bus_remove+0x18/0x30
 [  745.557134]  device_release_driver_internal+0x1df/0x240
 [  745.557654]  bus_remove_device+0xd7/0x140
 [  745.558075]  device_del+0x15b/0x3c0
 [  745.558456]  mlx5_rescan_drivers_locked.part.0+0xb1/0x2f0 [mlx5_core]
 [  745.559112]  mlx5_unregister_device+0x34/0x50 [mlx5_core]
 [  745.559686]  mlx5_uninit_one+0x46/0xf0 [mlx5_core]
 [  745.560203]  remove_one+0x4e/0xd0 [mlx5_core]
 [  745.560694]  pci_device_remove+0x39/0xa0
 [  745.561112]  device_release_driver_internal+0x1df/0x240
 [  745.561631]  driver_detach+0x47/0x90
 [  745.562022]  bus_remove_driver+0x84/0x100
 [  745.562444]  pci_unregister_driver+0x3b/0x90
 [  745.562890]  mlx5_cleanup+0xc/0x1b [mlx5_core]
 [  745.563415]  __x64_sys_delete_module+0x14d/0x2f0
 [  745.563886]  ? kmem_cache_free+0x1b0/0x460
 [  745.564313]  ? lockdep_hardirqs_on_prepare+0xe2/0x190
 [  745.564825]  do_syscall_64+0x6d/0x140
 [  745.565223]  entry_SYSCALL_64_after_hwframe+0x4b/0x53
 [  745.565725] RIP: 0033:0x7f1579b1288b</Note>
    </Notes>
    <CVE>CVE-2024-50146</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50146.html</URL>
        <Description>CVE-2024-50146</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233056</URL>
        <Description>SUSE Bug 1233056</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="159">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix command bitmask initialization

Command bitmask have a dedicated bit for MANAGE_PAGES command, this bit
isn't Initialize during command bitmask Initialization, only during
MANAGE_PAGES.

In addition, mlx5_cmd_trigger_completions() is trying to trigger
completion for MANAGE_PAGES command as well.

Hence, in case health error occurred before any MANAGE_PAGES command
have been invoke (for example, during mlx5_enable_hca()),
mlx5_cmd_trigger_completions() will try to trigger completion for
MANAGE_PAGES command, which will result in null-ptr-deref error.[1]

Fix it by Initialize command bitmask correctly.

While at it, re-write the code for better understanding.

[1]
BUG: KASAN: null-ptr-deref in mlx5_cmd_trigger_completions+0x1db/0x600 [mlx5_core]
Write of size 4 at addr 0000000000000214 by task kworker/u96:2/12078
CPU: 10 PID: 12078 Comm: kworker/u96:2 Not tainted 6.9.0-rc2_for_upstream_debug_2024_04_07_19_01 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
Workqueue: mlx5_health0000:08:00.0 mlx5_fw_fatal_reporter_err_work [mlx5_core]
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x7e/0xc0
 kasan_report+0xb9/0xf0
 kasan_check_range+0xec/0x190
 mlx5_cmd_trigger_completions+0x1db/0x600 [mlx5_core]
 mlx5_cmd_flush+0x94/0x240 [mlx5_core]
 enter_error_state+0x6c/0xd0 [mlx5_core]
 mlx5_fw_fatal_reporter_err_work+0xf3/0x480 [mlx5_core]
 process_one_work+0x787/0x1490
 ? lockdep_hardirqs_on_prepare+0x400/0x400
 ? pwq_dec_nr_in_flight+0xda0/0xda0
 ? assign_work+0x168/0x240
 worker_thread+0x586/0xd30
 ? rescuer_thread+0xae0/0xae0
 kthread+0x2df/0x3b0
 ? kthread_complete_and_exit+0x20/0x20
 ret_from_fork+0x2d/0x70
 ? kthread_complete_and_exit+0x20/0x20
 ret_from_fork_asm+0x11/0x20
 &lt;/TASK&gt;</Note>
    </Notes>
    <CVE>CVE-2024-50147</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50147.html</URL>
        <Description>CVE-2024-50147</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233067</URL>
        <Description>SUSE Bug 1233067</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="160">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: bnep: fix wild-memory-access in proto_unregister

There's issue as follows:
  KASAN: maybe wild-memory-access in range [0xdead...108-0xdead...10f]
  CPU: 3 UID: 0 PID: 2805 Comm: rmmod Tainted: G        W
  RIP: 0010:proto_unregister+0xee/0x400
  Call Trace:
   &lt;TASK&gt;
   __do_sys_delete_module+0x318/0x580
   do_syscall_64+0xc1/0x1d0
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

As bnep_init() ignore bnep_sock_init()'s return value, and bnep_sock_init()
will cleanup all resource. Then when remove bnep module will call
bnep_sock_cleanup() to cleanup sock's resource.
To solve above issue just return bnep_sock_init()'s return value in
bnep_exit().</Note>
    </Notes>
    <CVE>CVE-2024-50148</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50148.html</URL>
        <Description>CVE-2024-50148</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233063</URL>
        <Description>SUSE Bug 1233063</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="161">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

usb: typec: altmode should keep reference to parent

The altmode device release refers to its parent device, but without keeping
a reference to it.

When registering the altmode, get a reference to the parent and put it in
the release function.

Before this fix, when using CONFIG_DEBUG_KOBJECT_RELEASE, we see issues
like this:

[   43.572860] kobject: 'port0.0' (ffff8880057ba008): kobject_release, parent 0000000000000000 (delayed 3000)
[   43.573532] kobject: 'port0.1' (ffff8880057bd008): kobject_release, parent 0000000000000000 (delayed 1000)
[   43.574407] kobject: 'port0' (ffff8880057b9008): kobject_release, parent 0000000000000000 (delayed 3000)
[   43.575059] kobject: 'port1.0' (ffff8880057ca008): kobject_release, parent 0000000000000000 (delayed 4000)
[   43.575908] kobject: 'port1.1' (ffff8880057c9008): kobject_release, parent 0000000000000000 (delayed 4000)
[   43.576908] kobject: 'typec' (ffff8880062dbc00): kobject_release, parent 0000000000000000 (delayed 4000)
[   43.577769] kobject: 'port1' (ffff8880057bf008): kobject_release, parent 0000000000000000 (delayed 3000)
[   46.612867] ==================================================================
[   46.613402] BUG: KASAN: slab-use-after-free in typec_altmode_release+0x38/0x129
[   46.614003] Read of size 8 at addr ffff8880057b9118 by task kworker/2:1/48
[   46.614538]
[   46.614668] CPU: 2 UID: 0 PID: 48 Comm: kworker/2:1 Not tainted 6.12.0-rc1-00138-gedbae730ad31 #535
[   46.615391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014
[   46.616042] Workqueue: events kobject_delayed_cleanup
[   46.616446] Call Trace:
[   46.616648]  &lt;TASK&gt;
[   46.616820]  dump_stack_lvl+0x5b/0x7c
[   46.617112]  ? typec_altmode_release+0x38/0x129
[   46.617470]  print_report+0x14c/0x49e
[   46.617769]  ? rcu_read_unlock_sched+0x56/0x69
[   46.618117]  ? __virt_addr_valid+0x19a/0x1ab
[   46.618456]  ? kmem_cache_debug_flags+0xc/0x1d
[   46.618807]  ? typec_altmode_release+0x38/0x129
[   46.619161]  kasan_report+0x8d/0xb4
[   46.619447]  ? typec_altmode_release+0x38/0x129
[   46.619809]  ? process_scheduled_works+0x3cb/0x85f
[   46.620185]  typec_altmode_release+0x38/0x129
[   46.620537]  ? process_scheduled_works+0x3cb/0x85f
[   46.620907]  device_release+0xaf/0xf2
[   46.621206]  kobject_delayed_cleanup+0x13b/0x17a
[   46.621584]  process_scheduled_works+0x4f6/0x85f
[   46.621955]  ? __pfx_process_scheduled_works+0x10/0x10
[   46.622353]  ? hlock_class+0x31/0x9a
[   46.622647]  ? lock_acquired+0x361/0x3c3
[   46.622956]  ? move_linked_works+0x46/0x7d
[   46.623277]  worker_thread+0x1ce/0x291
[   46.623582]  ? __kthread_parkme+0xc8/0xdf
[   46.623900]  ? __pfx_worker_thread+0x10/0x10
[   46.624236]  kthread+0x17e/0x190
[   46.624501]  ? kthread+0xfb/0x190
[   46.624756]  ? __pfx_kthread+0x10/0x10
[   46.625015]  ret_from_fork+0x20/0x40
[   46.625268]  ? __pfx_kthread+0x10/0x10
[   46.625532]  ret_from_fork_asm+0x1a/0x30
[   46.625805]  &lt;/TASK&gt;
[   46.625953]
[   46.626056] Allocated by task 678:
[   46.626287]  kasan_save_stack+0x24/0x44
[   46.626555]  kasan_save_track+0x14/0x2d
[   46.626811]  __kasan_kmalloc+0x3f/0x4d
[   46.627049]  __kmalloc_noprof+0x1bf/0x1f0
[   46.627362]  typec_register_port+0x23/0x491
[   46.627698]  cros_typec_probe+0x634/0xbb6
[   46.628026]  platform_probe+0x47/0x8c
[   46.628311]  really_probe+0x20a/0x47d
[   46.628605]  device_driver_attach+0x39/0x72
[   46.628940]  bind_store+0x87/0xd7
[   46.629213]  kernfs_fop_write_iter+0x1aa/0x218
[   46.629574]  vfs_write+0x1d6/0x29b
[   46.629856]  ksys_write+0xcd/0x13b
[   46.630128]  do_syscall_64+0xd4/0x139
[   46.630420]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[   46.630820]
[   46.630946] Freed by task 48:
[   46.631182]  kasan_save_stack+0x24/0x44
[   46.631493]  kasan_save_track+0x14/0x2d
[   46.631799]  kasan_save_free_info+0x3f/0x4d
[   46.632144]  __kasan_slab_free+0x37/0x45
[   46.632474]
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-50150</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50150.html</URL>
        <Description>CVE-2024-50150</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233051</URL>
        <Description>SUSE Bug 1233051</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="162">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: target: core: Fix null-ptr-deref in target_alloc_device()

There is a null-ptr-deref issue reported by KASAN:

BUG: KASAN: null-ptr-deref in target_alloc_device+0xbc4/0xbe0 [target_core_mod]
...
 kasan_report+0xb9/0xf0
 target_alloc_device+0xbc4/0xbe0 [target_core_mod]
 core_dev_setup_virtual_lun0+0xef/0x1f0 [target_core_mod]
 target_core_init_configfs+0x205/0x420 [target_core_mod]
 do_one_initcall+0xdd/0x4e0
...
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

In target_alloc_device(), if allocing memory for dev queues fails, then
dev will be freed by dev-&gt;transport-&gt;free_device(), but dev-&gt;transport
is not initialized at that time, which will lead to a null pointer
reference problem.

Fixing this bug by freeing dev with hba-&gt;backend-&gt;ops-&gt;free_device().</Note>
    </Notes>
    <CVE>CVE-2024-50153</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50153.html</URL>
        <Description>CVE-2024-50153</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233061</URL>
        <Description>SUSE Bug 1233061</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="163">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink().

Martin KaFai Lau reported use-after-free [0] in reqsk_timer_handler().

  """
  We are seeing a use-after-free from a bpf prog attached to
  trace_tcp_retransmit_synack. The program passes the req-&gt;sk to the
  bpf_sk_storage_get_tracing kernel helper which does check for null
  before using it.
  """

The commit 83fccfc3940c ("inet: fix potential deadlock in
reqsk_queue_unlink()") added timer_pending() in reqsk_queue_unlink() not
to call del_timer_sync() from reqsk_timer_handler(), but it introduced a
small race window.

Before the timer is called, expire_timers() calls detach_timer(timer, true)
to clear timer-&gt;entry.pprev and marks it as not pending.

If reqsk_queue_unlink() checks timer_pending() just after expire_timers()
calls detach_timer(), TCP will miss del_timer_sync(); the reqsk timer will
continue running and send multiple SYN+ACKs until it expires.

The reported UAF could happen if req-&gt;sk is close()d earlier than the timer
expiration, which is 63s by default.

The scenario would be

  1. inet_csk_complete_hashdance() calls inet_csk_reqsk_queue_drop(),
     but del_timer_sync() is missed

  2. reqsk timer is executed and scheduled again

  3. req-&gt;sk is accept()ed and reqsk_put() decrements rsk_refcnt, but
     reqsk timer still has another one, and inet_csk_accept() does not
     clear req-&gt;sk for non-TFO sockets

  4. sk is close()d

  5. reqsk timer is executed again, and BPF touches req-&gt;sk

Let's not use timer_pending() by passing the caller context to
__inet_csk_reqsk_queue_drop().

Note that reqsk timer is pinned, so the issue does not happen in most
use cases. [1]

[0]
BUG: KFENCE: use-after-free read in bpf_sk_storage_get_tracing+0x2e/0x1b0

Use-after-free read at 0x00000000a891fb3a (in kfence-#1):
bpf_sk_storage_get_tracing+0x2e/0x1b0
bpf_prog_5ea3e95db6da0438_tcp_retransmit_synack+0x1d20/0x1dda
bpf_trace_run2+0x4c/0xc0
tcp_rtx_synack+0xf9/0x100
reqsk_timer_handler+0xda/0x3d0
run_timer_softirq+0x292/0x8a0
irq_exit_rcu+0xf5/0x320
sysvec_apic_timer_interrupt+0x6d/0x80
asm_sysvec_apic_timer_interrupt+0x16/0x20
intel_idle_irq+0x5a/0xa0
cpuidle_enter_state+0x94/0x273
cpu_startup_entry+0x15e/0x260
start_secondary+0x8a/0x90
secondary_startup_64_no_verify+0xfa/0xfb

kfence-#1: 0x00000000a72cc7b6-0x00000000d97616d9, size=2376, cache=TCPv6

allocated by task 0 on cpu 9 at 260507.901592s:
sk_prot_alloc+0x35/0x140
sk_clone_lock+0x1f/0x3f0
inet_csk_clone_lock+0x15/0x160
tcp_create_openreq_child+0x1f/0x410
tcp_v6_syn_recv_sock+0x1da/0x700
tcp_check_req+0x1fb/0x510
tcp_v6_rcv+0x98b/0x1420
ipv6_list_rcv+0x2258/0x26e0
napi_complete_done+0x5b1/0x2990
mlx5e_napi_poll+0x2ae/0x8d0
net_rx_action+0x13e/0x590
irq_exit_rcu+0xf5/0x320
common_interrupt+0x80/0x90
asm_common_interrupt+0x22/0x40
cpuidle_enter_state+0xfb/0x273
cpu_startup_entry+0x15e/0x260
start_secondary+0x8a/0x90
secondary_startup_64_no_verify+0xfa/0xfb

freed by task 0 on cpu 9 at 260507.927527s:
rcu_core_si+0x4ff/0xf10
irq_exit_rcu+0xf5/0x320
sysvec_apic_timer_interrupt+0x6d/0x80
asm_sysvec_apic_timer_interrupt+0x16/0x20
cpuidle_enter_state+0xfb/0x273
cpu_startup_entry+0x15e/0x260
start_secondary+0x8a/0x90
secondary_startup_64_no_verify+0xfa/0xfb</Note>
    </Notes>
    <CVE>CVE-2024-50154</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50154.html</URL>
        <Description>CVE-2024-50154</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233070</URL>
        <Description>SUSE Bug 1233070</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233072</URL>
        <Description>SUSE Bug 1233072</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="164">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netdevsim: use cond_resched() in nsim_dev_trap_report_work()

I am still seeing many syzbot reports hinting that syzbot
might fool nsim_dev_trap_report_work() with hundreds of ports [1]

Lets use cond_resched(), and system_unbound_wq
instead of implicit system_wq.

[1]
INFO: task syz-executor:20633 blocked for more than 143 seconds.
      Not tainted 6.12.0-rc2-syzkaller-00205-g1d227fcc7222 #0
"echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor    state:D stack:25856 pid:20633 tgid:20633 ppid:1      flags:0x00004006
...
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 16760 Comm: kworker/1:0 Not tainted 6.12.0-rc2-syzkaller-00205-g1d227fcc7222 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: events nsim_dev_trap_report_work
 RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x70 kernel/kcov.c:210
Code: 89 fb e8 23 00 00 00 48 8b 3d 04 fb 9c 0c 48 89 de 5b e9 c3 c7 5d 00 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 &lt;f3&gt; 0f 1e fa 48 8b 04 24 65 48 8b 0c 25 c0 d7 03 00 65 8b 15 60 f0
RSP: 0018:ffffc90000a187e8 EFLAGS: 00000246
RAX: 0000000000000100 RBX: ffffc90000a188e0 RCX: ffff888027d3bc00
RDX: ffff888027d3bc00 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffff88804a2e6000 R08: ffffffff8a4bc495 R09: ffffffff89da3577
R10: 0000000000000004 R11: ffffffff8a4bc2b0 R12: dffffc0000000000
R13: ffff88806573b503 R14: dffffc0000000000 R15: ffff8880663cca00
FS:  0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fc90a747f98 CR3: 000000000e734000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 000000000000002b DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Call Trace:
 &lt;NMI&gt;
 &lt;/NMI&gt;
 &lt;TASK&gt;
  __local_bh_enable_ip+0x1bb/0x200 kernel/softirq.c:382
  spin_unlock_bh include/linux/spinlock.h:396 [inline]
  nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline]
  nsim_dev_trap_report_work+0x75d/0xaa0 drivers/net/netdevsim/dev.c:850
  process_one_work kernel/workqueue.c:3229 [inline]
  process_scheduled_works+0xa63/0x1850 kernel/workqueue.c:3310
  worker_thread+0x870/0xd30 kernel/workqueue.c:3391
  kthread+0x2f0/0x390 kernel/kthread.c:389
  ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 &lt;/TASK&gt;</Note>
    </Notes>
    <CVE>CVE-2024-50155</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50155.html</URL>
        <Description>CVE-2024-50155</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233035</URL>
        <Description>SUSE Bug 1233035</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="165">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/msm: Avoid NULL dereference in msm_disp_state_print_regs()

If the allocation in msm_disp_state_dump_regs() failed then
`block-&gt;state` can be NULL. The msm_disp_state_print_regs() function
_does_ have code to try to handle it with:

  if (*reg)
    dump_addr = *reg;

...but since "dump_addr" is initialized to NULL the above is actually
a noop. The code then goes on to dereference `dump_addr`.

Make the function print "Registers not stored" when it sees a NULL to
solve this. Since we're touching the code, fix
msm_disp_state_print_regs() not to pointlessly take a double-pointer
and properly mark the pointer as `const`.

Patchwork: https://patchwork.freedesktop.org/patch/619657/</Note>
    </Notes>
    <CVE>CVE-2024-50156</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50156.html</URL>
        <Description>CVE-2024-50156</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233073</URL>
        <Description>SUSE Bug 1233073</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="166">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda/cs8409: Fix possible NULL dereference

If snd_hda_gen_add_kctl fails to allocate memory and returns NULL, then
NULL pointer dereference will occur in the next line.

Since dolphin_fixups function is a hda_fixup function which is not supposed
to return any errors, add simple check before dereference, ignore the fail.

Found by Linux Verification Center (linuxtesting.org) with SVACE.</Note>
    </Notes>
    <CVE>CVE-2024-50160</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50160.html</URL>
        <Description>CVE-2024-50160</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233074</URL>
        <Description>SUSE Bug 1233074</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="167">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

be2net: fix potential memory leak in be_xmit()

The be_xmit() returns NETDEV_TX_OK without freeing skb
in case of be_xmit_enqueue() fails, add dev_kfree_skb_any() to fix it.</Note>
    </Notes>
    <CVE>CVE-2024-50167</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50167.html</URL>
        <Description>CVE-2024-50167</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233049</URL>
        <Description>SUSE Bug 1233049</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="168">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: systemport: fix potential memory leak in bcm_sysport_xmit()

The bcm_sysport_xmit() returns NETDEV_TX_OK without freeing skb
in case of dma_map_single() fails, add dev_kfree_skb() to fix it.</Note>
    </Notes>
    <CVE>CVE-2024-50171</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50171.html</URL>
        <Description>CVE-2024-50171</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233057</URL>
        <Description>SUSE Bug 1233057</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="169">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ceph: remove the incorrect Fw reference check when dirtying pages

When doing the direct-io reads it will also try to mark pages dirty,
but for the read path it won't hold the Fw caps and there is case
will it get the Fw reference.</Note>
    </Notes>
    <CVE>CVE-2024-50179</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50179.html</URL>
        <Description>CVE-2024-50179</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233123</URL>
        <Description>SUSE Bug 1233123</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="170">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

fbdev: sisfb: Fix strbuf array overflow

The values of the variables xres and yres are placed in strbuf.
These variables are obtained from strbuf1.
The strbuf1 array contains digit characters
and a space if the array contains non-digit characters.
Then, when executing sprintf(strbuf, "%ux%ux8", xres, yres);
more than 16 bytes will be written to strbuf.
It is suggested to increase the size of the strbuf array to 24.

Found by Linux Verification Center (linuxtesting.org) with SVACE.</Note>
    </Notes>
    <CVE>CVE-2024-50180</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50180.html</URL>
        <Description>CVE-2024-50180</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233125</URL>
        <Description>SUSE Bug 1233125</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="171">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

secretmem: disable memfd_secret() if arch cannot set direct map

Return -ENOSYS from memfd_secret() syscall if !can_set_direct_map().  This
is the case for example on some arm64 configurations, where marking 4k
PTEs in the direct map not present can only be done if the direct map is
set up at 4k granularity in the first place (as ARM's break-before-make
semantics do not easily allow breaking apart large/gigantic pages).

More precisely, on arm64 systems with !can_set_direct_map(),
set_direct_map_invalid_noflush() is a no-op, however it returns success
(0) instead of an error.  This means that memfd_secret will seemingly
"work" (e.g.  syscall succeeds, you can mmap the fd and fault in pages),
but it does not actually achieve its goal of removing its memory from the
direct map.

Note that with this patch, memfd_secret() will start erroring on systems
where can_set_direct_map() returns false (arm64 with
CONFIG_RODATA_FULL_DEFAULT_ENABLED=n, CONFIG_DEBUG_PAGEALLOC=n and
CONFIG_KFENCE=n), but that still seems better than the current silent
failure.  Since CONFIG_RODATA_FULL_DEFAULT_ENABLED defaults to 'y', most
arm64 systems actually have a working memfd_secret() and aren't be
affected.

From going through the iterations of the original memfd_secret patch
series, it seems that disabling the syscall in these scenarios was the
intended behavior [1] (preferred over having
set_direct_map_invalid_noflush return an error as that would result in
SIGBUSes at page-fault time), however the check for it got dropped between
v16 [2] and v17 [3], when secretmem moved away from CMA allocations.

[1]: https://lore.kernel.org/lkml/20201124164930.GK8537@kernel.org/
[2]: https://lore.kernel.org/lkml/20210121122723.3446-11-rppt@kernel.org/#t
[3]: https://lore.kernel.org/lkml/20201125092208.12544-10-rppt@kernel.org/</Note>
    </Notes>
    <CVE>CVE-2024-50182</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50182.html</URL>
        <Description>CVE-2024-50182</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233129</URL>
        <Description>SUSE Bug 1233129</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="172">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV instance

Deleting an NPIV instance requires all fabric ndlps to be released before
an NPIV's resources can be torn down.  Failure to release fabric ndlps
beforehand opens kref imbalance race conditions.  Fix by forcing the DA_ID
to complete synchronously with usage of wait_queue.</Note>
    </Notes>
    <CVE>CVE-2024-50183</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50183.html</URL>
        <Description>CVE-2024-50183</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233130</URL>
        <Description>SUSE Bug 1233130</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="173">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

virtio_pmem: Check device status before requesting flush

If a pmem device is in a bad status, the driver side could wait for
host ack forever in virtio_pmem_flush(), causing the system to hang.

So add a status check in the beginning of virtio_pmem_flush() to return
early if the device is not activated.</Note>
    </Notes>
    <CVE>CVE-2024-50184</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50184.html</URL>
        <Description>CVE-2024-50184</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233135</URL>
        <Description>SUSE Bug 1233135</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="174">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: explicitly clear the sk pointer, when pf-&gt;create fails

We have recently noticed the exact same KASAN splat as in commit
6cd4a78d962b ("net: do not leave a dangling sk pointer, when socket
creation fails"). The problem is that commit did not fully address the
problem, as some pf-&gt;create implementations do not use sk_common_release
in their error paths.

For example, we can use the same reproducer as in the above commit, but
changing ping to arping. arping uses AF_PACKET socket and if packet_create
fails, it will just sk_free the allocated sk object.

While we could chase all the pf-&gt;create implementations and make sure they
NULL the freed sk object on error from the socket, we can't guarantee
future protocols will not make the same mistake.

So it is easier to just explicitly NULL the sk pointer upon return from
pf-&gt;create in __sock_create. We do know that pf-&gt;create always releases the
allocated sk object on error, so if the pointer is not NULL, it is
definitely dangling.</Note>
    </Notes>
    <CVE>CVE-2024-50186</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50186.html</URL>
        <Description>CVE-2024-50186</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233110</URL>
        <Description>SUSE Bug 1233110</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="175">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/vc4: Stop the active perfmon before being destroyed

Upon closing the file descriptor, the active performance monitor is not
stopped. Although all perfmons are destroyed in `vc4_perfmon_close_file()`,
the active performance monitor's pointer (`vc4-&gt;active_perfmon`) is still
retained.

If we open a new file descriptor and submit a few jobs with performance
monitors, the driver will attempt to stop the active performance monitor
using the stale pointer in `vc4-&gt;active_perfmon`. However, this pointer
is no longer valid because the previous process has already terminated,
and all performance monitors associated with it have been destroyed and
freed.

To fix this, when the active performance monitor belongs to a given
process, explicitly stop it before destroying and freeing it.</Note>
    </Notes>
    <CVE>CVE-2024-50187</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50187.html</URL>
        <Description>CVE-2024-50187</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233108</URL>
        <Description>SUSE Bug 1233108</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="176">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: phy: dp83869: fix memory corruption when enabling fiber

When configuring the fiber port, the DP83869 PHY driver incorrectly
calls linkmode_set_bit() with a bit mask (1 &lt;&lt; 10) rather than a bit
number (10). This corrupts some other memory location -- in case of
arm64 the priv pointer in the same structure.

Since the advertising flags are updated from supported at the end of the
function the incorrect line isn't needed at all and can be removed.</Note>
    </Notes>
    <CVE>CVE-2024-50188</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50188.html</URL>
        <Description>CVE-2024-50188</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233107</URL>
        <Description>SUSE Bug 1233107</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="177">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

HID: amd_sfh: Switch to device-managed dmam_alloc_coherent()

Using the device-managed version allows to simplify clean-up in probe()
error path.

Additionally, this device-managed ensures proper cleanup, which helps to
resolve memory errors, page faults, btrfs going read-only, and btrfs
disk corruption.</Note>
    </Notes>
    <CVE>CVE-2024-50189</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50189.html</URL>
        <Description>CVE-2024-50189</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233105</URL>
        <Description>SUSE Bug 1233105</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="178">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

irqchip/gic-v4: Don't allow a VMOVP on a dying VPE

Kunkun Jiang reported that there is a small window of opportunity for
userspace to force a change of affinity for a VPE while the VPE has already
been unmapped, but the corresponding doorbell interrupt still visible in
/proc/irq/.

Plug the race by checking the value of vmapp_count, which tracks whether
the VPE is mapped ot not, and returning an error in this case.

This involves making vmapp_count common to both GICv4.1 and its v4.0
ancestor.</Note>
    </Notes>
    <CVE>CVE-2024-50192</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50192.html</URL>
        <Description>CVE-2024-50192</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233106</URL>
        <Description>SUSE Bug 1233106</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="179">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

arm64: probes: Fix uprobes for big-endian kernels

The arm64 uprobes code is broken for big-endian kernels as it doesn't
convert the in-memory instruction encoding (which is always
little-endian) into the kernel's native endianness before analyzing and
simulating instructions. This may result in a few distinct problems:

* The kernel may may erroneously reject probing an instruction which can
  safely be probed.

* The kernel may erroneously erroneously permit stepping an
  instruction out-of-line when that instruction cannot be stepped
  out-of-line safely.

* The kernel may erroneously simulate instruction incorrectly dur to
  interpretting the byte-swapped encoding.

The endianness mismatch isn't caught by the compiler or sparse because:

* The arch_uprobe::{insn,ixol} fields are encoded as arrays of u8, so
  the compiler and sparse have no idea these contain a little-endian
  32-bit value. The core uprobes code populates these with a memcpy()
  which similarly does not handle endianness.

* While the uprobe_opcode_t type is an alias for __le32, both
  arch_uprobe_analyze_insn() and arch_uprobe_skip_sstep() cast from u8[]
  to the similarly-named probe_opcode_t, which is an alias for u32.
  Hence there is no endianness conversion warning.

Fix this by changing the arch_uprobe::{insn,ixol} fields to __le32 and
adding the appropriate __le32_to_cpu() conversions prior to consuming
the instruction encoding. The core uprobes copies these fields as opaque
ranges of bytes, and so is unaffected by this change.

At the same time, remove MAX_UINSN_BYTES and consistently use
AARCH64_INSN_SIZE for clarity.

Tested with the following:

| #include &lt;stdio.h&gt;
| #include &lt;stdbool.h&gt;
|
| #define noinline __attribute__((noinline))
|
| static noinline void *adrp_self(void)
| {
|         void *addr;
|
|         asm volatile(
|         "       adrp    %x0, adrp_self\n"
|         "       add     %x0, %x0, :lo12:adrp_self\n"
|         : "=r" (addr));
| }
|
|
| int main(int argc, char *argv)
| {
|         void *ptr = adrp_self();
|         bool equal = (ptr == adrp_self);
|
|         printf("adrp_self   =&gt; %p\n"
|                "adrp_self() =&gt; %p\n"
|                "%s\n",
|                adrp_self, ptr, equal ? "EQUAL" : "NOT EQUAL");
|
|         return 0;
| }

.... where the adrp_self() function was compiled to:

| 00000000004007e0 &lt;adrp_self&gt;:
|   4007e0:       90000000        adrp    x0, 400000 &lt;__ehdr_start&gt;
|   4007e4:       911f8000        add     x0, x0, #0x7e0
|   4007e8:       d65f03c0        ret

Before this patch, the ADRP is not recognized, and is assumed to be
steppable, resulting in corruption of the result:

| # ./adrp-self
| adrp_self   =&gt; 0x4007e0
| adrp_self() =&gt; 0x4007e0
| EQUAL
| # echo 'p /root/adrp-self:0x007e0' &gt; /sys/kernel/tracing/uprobe_events
| # echo 1 &gt; /sys/kernel/tracing/events/uprobes/enable
| # ./adrp-self
| adrp_self   =&gt; 0x4007e0
| adrp_self() =&gt; 0xffffffffff7e0
| NOT EQUAL

After this patch, the ADRP is correctly recognized and simulated:

| # ./adrp-self
| adrp_self   =&gt; 0x4007e0
| adrp_self() =&gt; 0x4007e0
| EQUAL
| #
| # echo 'p /root/adrp-self:0x007e0' &gt; /sys/kernel/tracing/uprobe_events
| # echo 1 &gt; /sys/kernel/tracing/events/uprobes/enable
| # ./adrp-self
| adrp_self   =&gt; 0x4007e0
| adrp_self() =&gt; 0x4007e0
| EQUAL</Note>
    </Notes>
    <CVE>CVE-2024-50194</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50194.html</URL>
        <Description>CVE-2024-50194</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233111</URL>
        <Description>SUSE Bug 1233111</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="180">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

posix-clock: Fix missing timespec64 check in pc_clock_settime()

As Andrew pointed out, it will make sense that the PTP core
checked timespec64 struct's tv_sec and tv_nsec range before calling
ptp-&gt;info-&gt;settime64().

As the man manual of clock_settime() said, if tp.tv_sec is negative or
tp.tv_nsec is outside the range [0..999,999,999], it should return EINVAL,
which include dynamic clocks which handles PTP clock, and the condition is
consistent with timespec64_valid(). As Thomas suggested, timespec64_valid()
only check the timespec is valid, but not ensure that the time is
in a valid range, so check it ahead using timespec64_valid_strict()
in pc_clock_settime() and return -EINVAL if not valid.

There are some drivers that use tp-&gt;tv_sec and tp-&gt;tv_nsec directly to
write registers without validity checks and assume that the higher layer
has checked it, which is dangerous and will benefit from this, such as
hclge_ptp_settime(), igb_ptp_settime_i210(), _rcar_gen4_ptp_settime(),
and some drivers can remove the checks of itself.</Note>
    </Notes>
    <CVE>CVE-2024-50195</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50195.html</URL>
        <Description>CVE-2024-50195</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233103</URL>
        <Description>SUSE Bug 1233103</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="181">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

pinctrl: ocelot: fix system hang on level based interrupts

The current implementation only calls chained_irq_enter() and
chained_irq_exit() if it detects pending interrupts.

```
for (i = 0; i &lt; info-&gt;stride; i++) {
	uregmap_read(info-&gt;map, id_reg + 4 * i, &amp;reg);
	if (!reg)
		continue;

	chained_irq_enter(parent_chip, desc);
```

However, in case of GPIO pin configured in level mode and the parent
controller configured in edge mode, GPIO interrupt might be lowered by the
hardware. In the result, if the interrupt is short enough, the parent
interrupt is still pending while the GPIO interrupt is cleared;
chained_irq_enter() never gets called and the system hangs trying to
service the parent interrupt.

Moving chained_irq_enter() and chained_irq_exit() outside the for loop
ensures that they are called even when GPIO interrupt is lowered by the
hardware.

The similar code with chained_irq_enter() / chained_irq_exit() functions
wrapping interrupt checking loop may be found in many other drivers:
```
grep -r -A 10 chained_irq_enter drivers/pinctrl
```</Note>
    </Notes>
    <CVE>CVE-2024-50196</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50196.html</URL>
        <Description>CVE-2024-50196</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233113</URL>
        <Description>SUSE Bug 1233113</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="182">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

iio: light: veml6030: fix IIO device retrieval from embedded device

The dev pointer that is received as an argument in the
in_illuminance_period_available_show function references the device
embedded in the IIO device, not in the i2c client.

dev_to_iio_dev() must be used to accessthe right data. The current
implementation leads to a segmentation fault on every attempt to read
the attribute because indio_dev gets a NULL assignment.

This bug has been present since the first appearance of the driver,
apparently since the last version (V6) before getting applied. A
constant attribute was used until then, and the last modifications might
have not been tested again.</Note>
    </Notes>
    <CVE>CVE-2024-50198</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50198.html</URL>
        <Description>CVE-2024-50198</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233100</URL>
        <Description>SUSE Bug 1233100</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="183">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: Fix encoder-&gt;possible_clones

Include the encoder itself in its possible_clones bitmask.
In the past nothing validated that drivers were populating
possible_clones correctly, but that changed in commit
74d2aacbe840 ("drm: Validate encoder-&gt;possible_clones").
Looks like radeon never got the memo and is still not
following the rules 100% correctly.

This results in some warnings during driver initialization:
Bogus possible_clones: [ENCODER:46:TV-46] possible_clones=0x4 (full encoder mask=0x7)
WARNING: CPU: 0 PID: 170 at drivers/gpu/drm/drm_mode_config.c:615 drm_mode_config_validate+0x113/0x39c
...

(cherry picked from commit 3b6e7d40649c0d75572039aff9d0911864c689db)</Note>
    </Notes>
    <CVE>CVE-2024-50201</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50201.html</URL>
        <Description>CVE-2024-50201</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233104</URL>
        <Description>SUSE Bug 1233104</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="184">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size()

The step variable is initialized to zero. It is changed in the loop,
but if it's not changed it will remain zero. Add a variable check
before the division.

The observed behavior was introduced by commit 826b5de90c0b
("ALSA: firewire-lib: fix insufficient PCM rule for period/buffer size"),
and it is difficult to show that any of the interval parameters will
satisfy the snd_interval_test() condition with data from the
amdtp_rate_table[] table.

Found by Linux Verification Center (linuxtesting.org) with SVACE.</Note>
    </Notes>
    <CVE>CVE-2024-50205</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50205.html</URL>
        <Description>CVE-2024-50205</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233293</URL>
        <Description>SUSE Bug 1233293</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233294</URL>
        <Description>SUSE Bug 1233294</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="185">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages

Avoid memory corruption while setting up Level-2 PBL pages for the non MR
resources when num_pages &gt; 256K.

There will be a single PDE page address (contiguous pages in the case of &gt;
PAGE_SIZE), but, current logic assumes multiple pages, leading to invalid
memory access after 256K PBL entries in the PDE.</Note>
    </Notes>
    <CVE>CVE-2024-50208</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50208.html</URL>
        <Description>CVE-2024-50208</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233117</URL>
        <Description>SUSE Bug 1233117</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233118</URL>
        <Description>SUSE Bug 1233118</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="186">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

RDMA/bnxt_re: Add a check for memory allocation

__alloc_pbl() can return error when memory allocation fails.
Driver is not checking the status on one of the instances.</Note>
    </Notes>
    <CVE>CVE-2024-50209</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50209.html</URL>
        <Description>CVE-2024-50209</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233114</URL>
        <Description>SUSE Bug 1233114</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="187">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nvmet-auth: assign dh_key to NULL after kfree_sensitive

ctrl-&gt;dh_key might be used across multiple calls to nvmet_setup_dhgroup()
for the same controller. So it's better to nullify it after release on
error path in order to avoid double free later in nvmet_destroy_auth().

Found by Linux Verification Center (linuxtesting.org) with Svace.</Note>
    </Notes>
    <CVE>CVE-2024-50215</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50215.html</URL>
        <Description>CVE-2024-50215</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233189</URL>
        <Description>SUSE Bug 1233189</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="188">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow

Syzbot reported a kernel BUG in ocfs2_truncate_inline.  There are two
reasons for this: first, the parameter value passed is greater than
ocfs2_max_inline_data_with_xattr, second, the start and end parameters of
ocfs2_truncate_inline are "unsigned int".

So, we need to add a sanity check for byte_start and byte_len right before
ocfs2_truncate_inline() in ocfs2_remove_inode_range(), if they are greater
than ocfs2_max_inline_data_with_xattr return -EINVAL.</Note>
    </Notes>
    <CVE>CVE-2024-50218</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50218.html</URL>
        <Description>CVE-2024-50218</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233191</URL>
        <Description>SUSE Bug 1233191</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="189">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix potential deadlock with newly created symlinks

Syzbot reported that page_symlink(), called by nilfs_symlink(), triggers
memory reclamation involving the filesystem layer, which can result in
circular lock dependencies among the reader/writer semaphore
nilfs-&gt;ns_segctor_sem, s_writers percpu_rwsem (intwrite) and the
fs_reclaim pseudo lock.

This is because after commit 21fc61c73c39 ("don't put symlink bodies in
pagecache into highmem"), the gfp flags of the page cache for symbolic
links are overwritten to GFP_KERNEL via inode_nohighmem().

This is not a problem for symlinks read from the backing device, because
the __GFP_FS flag is dropped after inode_nohighmem() is called.  However,
when a new symlink is created with nilfs_symlink(), the gfp flags remain
overwritten to GFP_KERNEL.  Then, memory allocation called from
page_symlink() etc.  triggers memory reclamation including the FS layer,
which may call nilfs_evict_inode() or nilfs_dirty_inode().  And these can
cause a deadlock if they are called while nilfs-&gt;ns_segctor_sem is held:

Fix this issue by dropping the __GFP_FS flag from the page cache GFP flags
of newly created symlinks in the same way that nilfs_new_inode() and
__nilfs_read_inode() do, as a workaround until we adopt nofs allocation
scope consistently or improve the locking constraints.</Note>
    </Notes>
    <CVE>CVE-2024-50229</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50229.html</URL>
        <Description>CVE-2024-50229</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233205</URL>
        <Description>SUSE Bug 1233205</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="190">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix kernel bug due to missing clearing of checked flag

Syzbot reported that in directory operations after nilfs2 detects
filesystem corruption and degrades to read-only,
__block_write_begin_int(), which is called to prepare block writes, may
fail the BUG_ON check for accesses exceeding the folio/page size,
triggering a kernel bug.

This was found to be because the "checked" flag of a page/folio was not
cleared when it was discarded by nilfs2's own routine, which causes the
sanity check of directory entries to be skipped when the directory
page/folio is reloaded.  So, fix that.

This was necessary when the use of nilfs2's own page discard routine was
applied to more than just metadata files.</Note>
    </Notes>
    <CVE>CVE-2024-50230</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50230.html</URL>
        <Description>CVE-2024-50230</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233206</URL>
        <Description>SUSE Bug 1233206</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="191">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr()

In the ad7124_write_raw() function, parameter val can potentially
be zero. This may lead to a division by zero when DIV_ROUND_CLOSEST()
is called within ad7124_set_channel_odr(). The ad7124_write_raw()
function is invoked through the sequence: iio_write_channel_raw() -&gt;
iio_write_channel_attribute() -&gt; iio_channel_write(), with no checks
in place to ensure val is non-zero.</Note>
    </Notes>
    <CVE>CVE-2024-50232</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50232.html</URL>
        <Description>CVE-2024-50232</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233209</URL>
        <Description>SUSE Bug 1233209</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="192">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg()

In the ad9832_write_frequency() function, clk_get_rate() might return 0.
This can lead to a division by zero when calling ad9832_calc_freqreg().
The check if (fout &gt; (clk_get_rate(st-&gt;mclk) / 2)) does not protect
against the case when fout is 0. The ad9832_write_frequency() function
is called from ad9832_write(), and fout is derived from a text buffer,
which can contain any value.</Note>
    </Notes>
    <CVE>CVE-2024-50233</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50233.html</URL>
        <Description>CVE-2024-50233</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233210</URL>
        <Description>SUSE Bug 1233210</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="193">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlegacy: Clear stale interrupts before resuming device

iwl4965 fails upon resume from hibernation on my laptop. The reason
seems to be a stale interrupt which isn't being cleared out before
interrupts are enabled. We end up with a race beween the resume
trying to bring things back up, and the restart work (queued form
the interrupt handler) trying to bring things down. Eventually
the whole thing blows up.

Fix the problem by clearing out any stale interrupts before
interrupts get enabled during resume.

Here's a debug log of the indicent:
[   12.042589] ieee80211 phy0: il_isr ISR inta 0x00000080, enabled 0xaa00008b, fh 0x00000000
[   12.042625] ieee80211 phy0: il4965_irq_tasklet inta 0x00000080, enabled 0x00000000, fh 0x00000000
[   12.042651] iwl4965 0000:10:00.0: RF_KILL bit toggled to enable radio.
[   12.042653] iwl4965 0000:10:00.0: On demand firmware reload
[   12.042690] ieee80211 phy0: il4965_irq_tasklet End inta 0x00000000, enabled 0xaa00008b, fh 0x00000000, flags 0x00000282
[   12.052207] ieee80211 phy0: il4965_mac_start enter
[   12.052212] ieee80211 phy0: il_prep_station Add STA to driver ID 31: ff:ff:ff:ff:ff:ff
[   12.052244] ieee80211 phy0: il4965_set_hw_ready hardware  ready
[   12.052324] ieee80211 phy0: il_apm_init Init card's basic functions
[   12.052348] ieee80211 phy0: il_apm_init L1 Enabled; Disabling L0S
[   12.055727] ieee80211 phy0: il4965_load_bsm Begin load bsm
[   12.056140] ieee80211 phy0: il4965_verify_bsm Begin verify bsm
[   12.058642] ieee80211 phy0: il4965_verify_bsm BSM bootstrap uCode image OK
[   12.058721] ieee80211 phy0: il4965_load_bsm BSM write complete, poll 1 iterations
[   12.058734] ieee80211 phy0: __il4965_up iwl4965 is coming up
[   12.058737] ieee80211 phy0: il4965_mac_start Start UP work done.
[   12.058757] ieee80211 phy0: __il4965_down iwl4965 is going down
[   12.058761] ieee80211 phy0: il_scan_cancel_timeout Scan cancel timeout
[   12.058762] ieee80211 phy0: il_do_scan_abort Not performing scan to abort
[   12.058765] ieee80211 phy0: il_clear_ucode_stations Clearing ucode stations in driver
[   12.058767] ieee80211 phy0: il_clear_ucode_stations No active stations found to be cleared
[   12.058819] ieee80211 phy0: _il_apm_stop Stop card, put in low power state
[   12.058827] ieee80211 phy0: _il_apm_stop_master stop master
[   12.058864] ieee80211 phy0: il4965_clear_free_frames 0 frames on pre-allocated heap on clear.
[   12.058869] ieee80211 phy0: Hardware restart was requested
[   16.132299] iwl4965 0000:10:00.0: START_ALIVE timeout after 4000ms.
[   16.132303] ------------[ cut here ]------------
[   16.132304] Hardware became unavailable upon resume. This could be a software issue prior to suspend or a hardware issue.
[   16.132338] WARNING: CPU: 0 PID: 181 at net/mac80211/util.c:1826 ieee80211_reconfig+0x8f/0x14b0 [mac80211]
[   16.132390] Modules linked in: ctr ccm sch_fq_codel xt_tcpudp xt_multiport xt_state iptable_filter iptable_nat nf_nat nf_conntrack nf_defrag_ipv4 ip_tables x_tables binfmt_misc joydev mousedev btusb btrtl btintel btbcm bluetooth ecdh_generic ecc iTCO_wdt i2c_dev iwl4965 iwlegacy coretemp snd_hda_codec_analog pcspkr psmouse mac80211 snd_hda_codec_generic libarc4 sdhci_pci cqhci sha256_generic sdhci libsha256 firewire_ohci snd_hda_intel snd_intel_dspcfg mmc_core snd_hda_codec snd_hwdep firewire_core led_class iosf_mbi snd_hda_core uhci_hcd lpc_ich crc_itu_t cfg80211 ehci_pci ehci_hcd snd_pcm usbcore mfd_core rfkill snd_timer snd usb_common soundcore video parport_pc parport intel_agp wmi intel_gtt backlight e1000e agpgart evdev
[   16.132456] CPU: 0 UID: 0 PID: 181 Comm: kworker/u8:6 Not tainted 6.11.0-cl+ #143
[   16.132460] Hardware name: Hewlett-Packard HP Compaq 6910p/30BE, BIOS 68MCU Ver. F.19 07/06/2010
[   16.132463] Workqueue: async async_run_entry_fn
[   16.132469] RIP: 0010:ieee80211_reconfig+0x8f/0x14b0 [mac80211]
[   16.132501] Code: da 02 00 0
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-50234</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50234.html</URL>
        <Description>CVE-2024-50234</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233211</URL>
        <Description>SUSE Bug 1233211</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="194">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: ath10k: Fix memory leak in management tx

In the current logic, memory is allocated for storing the MSDU context
during management packet TX but this memory is not being freed during
management TX completion. Similar leaks are seen in the management TX
cleanup logic.

Kmemleak reports this problem as below,

unreferenced object 0xffffff80b64ed250 (size 16):
  comm "kworker/u16:7", pid 148, jiffies 4294687130 (age 714.199s)
  hex dump (first 16 bytes):
    00 2b d8 d8 80 ff ff ff c4 74 e9 fd 07 00 00 00  .+.......t......
  backtrace:
    [&lt;ffffffe6e7b245dc&gt;] __kmem_cache_alloc_node+0x1e4/0x2d8
    [&lt;ffffffe6e7adde88&gt;] kmalloc_trace+0x48/0x110
    [&lt;ffffffe6bbd765fc&gt;] ath10k_wmi_tlv_op_gen_mgmt_tx_send+0xd4/0x1d8 [ath10k_core]
    [&lt;ffffffe6bbd3eed4&gt;] ath10k_mgmt_over_wmi_tx_work+0x134/0x298 [ath10k_core]
    [&lt;ffffffe6e78d5974&gt;] process_scheduled_works+0x1ac/0x400
    [&lt;ffffffe6e78d60b8&gt;] worker_thread+0x208/0x328
    [&lt;ffffffe6e78dc890&gt;] kthread+0x100/0x1c0
    [&lt;ffffffe6e78166c0&gt;] ret_from_fork+0x10/0x20

Free the memory during completion and cleanup to fix the leak.

Protect the mgmt_pending_tx idr_remove() operation in
ath10k_wmi_tlv_op_cleanup_mgmt_tx_send() using ar-&gt;data_lock similar to
other instances.

Tested-on: WCN3990 hw1.0 SNOC WLAN.HL.2.0-01387-QCAHLSWMTPLZ-1</Note>
    </Notes>
    <CVE>CVE-2024-50236</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50236.html</URL>
        <Description>CVE-2024-50236</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233212</URL>
        <Description>SUSE Bug 1233212</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="195">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower

Avoid potentially crashing in the driver because of uninitialized private data</Note>
    </Notes>
    <CVE>CVE-2024-50237</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50237.html</URL>
        <Description>CVE-2024-50237</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233216</URL>
        <Description>SUSE Bug 1233216</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="196">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ACPI: CPPC: Make rmw_lock a raw_spin_lock

The following BUG was triggered:

=============================
[ BUG: Invalid wait context ]
6.12.0-rc2-XXX #406 Not tainted
-----------------------------
kworker/1:1/62 is trying to lock:
ffffff8801593030 (&amp;cpc_ptr-&gt;rmw_lock){+.+.}-{3:3}, at: cpc_write+0xcc/0x370
other info that might help us debug this:
context-{5:5}
2 locks held by kworker/1:1/62:
  #0: ffffff897ef5ec98 (&amp;rq-&gt;__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2c/0x50
  #1: ffffff880154e238 (&amp;sg_policy-&gt;update_lock){....}-{2:2}, at: sugov_update_shared+0x3c/0x280
stack backtrace:
CPU: 1 UID: 0 PID: 62 Comm: kworker/1:1 Not tainted 6.12.0-rc2-g9654bd3e8806 #406
Workqueue:  0x0 (events)
Call trace:
  dump_backtrace+0xa4/0x130
  show_stack+0x20/0x38
  dump_stack_lvl+0x90/0xd0
  dump_stack+0x18/0x28
  __lock_acquire+0x480/0x1ad8
  lock_acquire+0x114/0x310
  _raw_spin_lock+0x50/0x70
  cpc_write+0xcc/0x370
  cppc_set_perf+0xa0/0x3a8
  cppc_cpufreq_fast_switch+0x40/0xc0
  cpufreq_driver_fast_switch+0x4c/0x218
  sugov_update_shared+0x234/0x280
  update_load_avg+0x6ec/0x7b8
  dequeue_entities+0x108/0x830
  dequeue_task_fair+0x58/0x408
  __schedule+0x4f0/0x1070
  schedule+0x54/0x130
  worker_thread+0xc0/0x2e8
  kthread+0x130/0x148
  ret_from_fork+0x10/0x20

sugov_update_shared() locks a raw_spinlock while cpc_write() locks a
spinlock.

To have a correct wait-type order, update rmw_lock to a raw spinlock and
ensure that interrupts will be disabled on the CPU holding it.

[ rjw: Changelog edits ]</Note>
    </Notes>
    <CVE>CVE-2024-50249</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50249.html</URL>
        <Description>CVE-2024-50249</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233197</URL>
        <Description>SUSE Bug 1233197</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="197">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs

Fix __hci_cmd_sync_sk() to return not NULL for unknown opcodes.

__hci_cmd_sync_sk() returns NULL if a command returns a status event.
However, it also returns NULL where an opcode doesn't exist in the
hci_cc table because hci_cmd_complete_evt() assumes status = skb-&gt;data[0]
for unknown opcodes.
This leads to null-ptr-deref in cmd_sync for HCI_OP_READ_LOCAL_CODECS as
there is no hci_cc for HCI_OP_READ_LOCAL_CODECS, which always assumes
status = skb-&gt;data[0].

KASAN: null-ptr-deref in range [0x0000000000000070-0x0000000000000077]
CPU: 1 PID: 2000 Comm: kworker/u9:5 Not tainted 6.9.0-ga6bcb805883c-dirty #10
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
Workqueue: hci7 hci_power_on
RIP: 0010:hci_read_supported_codecs+0xb9/0x870 net/bluetooth/hci_codec.c:138
Code: 08 48 89 ef e8 b8 c1 8f fd 48 8b 75 00 e9 96 00 00 00 49 89 c6 48 ba 00 00 00 00 00 fc ff df 4c 8d 60 70 4c 89 e3 48 c1 eb 03 &lt;0f&gt; b6 04 13 84 c0 0f 85 82 06 00 00 41 83 3c 24 02 77 0a e8 bf 78
RSP: 0018:ffff888120bafac8 EFLAGS: 00010212
RAX: 0000000000000000 RBX: 000000000000000e RCX: ffff8881173f0040
RDX: dffffc0000000000 RSI: ffffffffa58496c0 RDI: ffff88810b9ad1e4
RBP: ffff88810b9ac000 R08: ffffffffa77882a7 R09: 1ffffffff4ef1054
R10: dffffc0000000000 R11: fffffbfff4ef1055 R12: 0000000000000070
R13: 0000000000000000 R14: 0000000000000000 R15: ffff88810b9ac000
FS:  0000000000000000(0000) GS:ffff8881f6c00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f6ddaa3439e CR3: 0000000139764003 CR4: 0000000000770ef0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 hci_read_local_codecs_sync net/bluetooth/hci_sync.c:4546 [inline]
 hci_init_stage_sync net/bluetooth/hci_sync.c:3441 [inline]
 hci_init4_sync net/bluetooth/hci_sync.c:4706 [inline]
 hci_init_sync net/bluetooth/hci_sync.c:4742 [inline]
 hci_dev_init_sync net/bluetooth/hci_sync.c:4912 [inline]
 hci_dev_open_sync+0x19a9/0x2d30 net/bluetooth/hci_sync.c:4994
 hci_dev_do_open net/bluetooth/hci_core.c:483 [inline]
 hci_power_on+0x11e/0x560 net/bluetooth/hci_core.c:1015
 process_one_work kernel/workqueue.c:3267 [inline]
 process_scheduled_works+0x8ef/0x14f0 kernel/workqueue.c:3348
 worker_thread+0x91f/0xe50 kernel/workqueue.c:3429
 kthread+0x2cb/0x360 kernel/kthread.c:388
 ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244</Note>
    </Notes>
    <CVE>CVE-2024-50255</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50255.html</URL>
        <Description>CVE-2024-50255</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233238</URL>
        <Description>SUSE Bug 1233238</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="198">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write()

This was found by a static analyzer.
We should not forget the trailing zero after copy_from_user()
if we will further do some string operations, sscanf() in this
case. Adding a trailing zero will ensure that the function
performs properly.</Note>
    </Notes>
    <CVE>CVE-2024-50259</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50259.html</URL>
        <Description>CVE-2024-50259</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233214</URL>
        <Description>SUSE Bug 1233214</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233215</URL>
        <Description>SUSE Bug 1233215</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="199">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

macsec: Fix use-after-free while sending the offloading packet

KASAN reports the following UAF. The metadata_dst, which is used to
store the SCI value for macsec offload, is already freed by
metadata_dst_free() in macsec_free_netdev(), while driver still use it
for sending the packet.

To fix this issue, dst_release() is used instead to release
metadata_dst. So it is not freed instantly in macsec_free_netdev() if
still referenced by skb.

 BUG: KASAN: slab-use-after-free in mlx5e_xmit+0x1e8f/0x4190 [mlx5_core]
 Read of size 2 at addr ffff88813e42e038 by task kworker/7:2/714
 [...]
 Workqueue: mld mld_ifc_work
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x51/0x60
  print_report+0xc1/0x600
  kasan_report+0xab/0xe0
  mlx5e_xmit+0x1e8f/0x4190 [mlx5_core]
  dev_hard_start_xmit+0x120/0x530
  sch_direct_xmit+0x149/0x11e0
  __qdisc_run+0x3ad/0x1730
  __dev_queue_xmit+0x1196/0x2ed0
  vlan_dev_hard_start_xmit+0x32e/0x510 [8021q]
  dev_hard_start_xmit+0x120/0x530
  __dev_queue_xmit+0x14a7/0x2ed0
  macsec_start_xmit+0x13e9/0x2340
  dev_hard_start_xmit+0x120/0x530
  __dev_queue_xmit+0x14a7/0x2ed0
  ip6_finish_output2+0x923/0x1a70
  ip6_finish_output+0x2d7/0x970
  ip6_output+0x1ce/0x3a0
  NF_HOOK.constprop.0+0x15f/0x190
  mld_sendpack+0x59a/0xbd0
  mld_ifc_work+0x48a/0xa80
  process_one_work+0x5aa/0xe50
  worker_thread+0x79c/0x1290
  kthread+0x28f/0x350
  ret_from_fork+0x2d/0x70
  ret_from_fork_asm+0x11/0x20
  &lt;/TASK&gt;

 Allocated by task 3922:
  kasan_save_stack+0x20/0x40
  kasan_save_track+0x10/0x30
  __kasan_kmalloc+0x77/0x90
  __kmalloc_noprof+0x188/0x400
  metadata_dst_alloc+0x1f/0x4e0
  macsec_newlink+0x914/0x1410
  __rtnl_newlink+0xe08/0x15b0
  rtnl_newlink+0x5f/0x90
  rtnetlink_rcv_msg+0x667/0xa80
  netlink_rcv_skb+0x12c/0x360
  netlink_unicast+0x551/0x770
  netlink_sendmsg+0x72d/0xbd0
  __sock_sendmsg+0xc5/0x190
  ____sys_sendmsg+0x52e/0x6a0
  ___sys_sendmsg+0xeb/0x170
  __sys_sendmsg+0xb5/0x140
  do_syscall_64+0x4c/0x100
  entry_SYSCALL_64_after_hwframe+0x4b/0x53

 Freed by task 4011:
  kasan_save_stack+0x20/0x40
  kasan_save_track+0x10/0x30
  kasan_save_free_info+0x37/0x50
  poison_slab_object+0x10c/0x190
  __kasan_slab_free+0x11/0x30
  kfree+0xe0/0x290
  macsec_free_netdev+0x3f/0x140
  netdev_run_todo+0x450/0xc70
  rtnetlink_rcv_msg+0x66f/0xa80
  netlink_rcv_skb+0x12c/0x360
  netlink_unicast+0x551/0x770
  netlink_sendmsg+0x72d/0xbd0
  __sock_sendmsg+0xc5/0x190
  ____sys_sendmsg+0x52e/0x6a0
  ___sys_sendmsg+0xeb/0x170
  __sys_sendmsg+0xb5/0x140
  do_syscall_64+0x4c/0x100
  entry_SYSCALL_64_after_hwframe+0x4b/0x53</Note>
    </Notes>
    <CVE>CVE-2024-50261</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50261.html</URL>
        <Description>CVE-2024-50261</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233253</URL>
        <Description>SUSE Bug 1233253</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="200">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

vsock/virtio: Initialization of the dangling pointer occurring in vsk-&gt;trans

During loopback communication, a dangling pointer can be created in
vsk-&gt;trans, potentially leading to a Use-After-Free condition.  This
issue is resolved by initializing vsk-&gt;trans to NULL.</Note>
    </Notes>
    <CVE>CVE-2024-50264</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50264.html</URL>
        <Description>CVE-2024-50264</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233453</URL>
        <Description>SUSE Bug 1233453</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233712</URL>
        <Description>SUSE Bug 1233712</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="201">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove()

Syzkaller is able to provoke null-ptr-dereference in ocfs2_xa_remove():

[   57.319872] (a.out,1161,7):ocfs2_xa_remove:2028 ERROR: status = -12
[   57.320420] (a.out,1161,7):ocfs2_xa_cleanup_value_truncate:1999 ERROR: Partial truncate while removing xattr overlay.upper.  Leaking 1 clusters and removing the entry
[   57.321727] BUG: kernel NULL pointer dereference, address: 0000000000000004
[...]
[   57.325727] RIP: 0010:ocfs2_xa_block_wipe_namevalue+0x2a/0xc0
[...]
[   57.331328] Call Trace:
[   57.331477]  &lt;TASK&gt;
[...]
[   57.333511]  ? do_user_addr_fault+0x3e5/0x740
[   57.333778]  ? exc_page_fault+0x70/0x170
[   57.334016]  ? asm_exc_page_fault+0x2b/0x30
[   57.334263]  ? __pfx_ocfs2_xa_block_wipe_namevalue+0x10/0x10
[   57.334596]  ? ocfs2_xa_block_wipe_namevalue+0x2a/0xc0
[   57.334913]  ocfs2_xa_remove_entry+0x23/0xc0
[   57.335164]  ocfs2_xa_set+0x704/0xcf0
[   57.335381]  ? _raw_spin_unlock+0x1a/0x40
[   57.335620]  ? ocfs2_inode_cache_unlock+0x16/0x20
[   57.335915]  ? trace_preempt_on+0x1e/0x70
[   57.336153]  ? start_this_handle+0x16c/0x500
[   57.336410]  ? preempt_count_sub+0x50/0x80
[   57.336656]  ? _raw_read_unlock+0x20/0x40
[   57.336906]  ? start_this_handle+0x16c/0x500
[   57.337162]  ocfs2_xattr_block_set+0xa6/0x1e0
[   57.337424]  __ocfs2_xattr_set_handle+0x1fd/0x5d0
[   57.337706]  ? ocfs2_start_trans+0x13d/0x290
[   57.337971]  ocfs2_xattr_set+0xb13/0xfb0
[   57.338207]  ? dput+0x46/0x1c0
[   57.338393]  ocfs2_xattr_trusted_set+0x28/0x30
[   57.338665]  ? ocfs2_xattr_trusted_set+0x28/0x30
[   57.338948]  __vfs_removexattr+0x92/0xc0
[   57.339182]  __vfs_removexattr_locked+0xd5/0x190
[   57.339456]  ? preempt_count_sub+0x50/0x80
[   57.339705]  vfs_removexattr+0x5f/0x100
[...]

Reproducer uses faultinject facility to fail ocfs2_xa_remove() -&gt;
ocfs2_xa_value_truncate() with -ENOMEM.

In this case the comment mentions that we can return 0 if
ocfs2_xa_cleanup_value_truncate() is going to wipe the entry
anyway. But the following 'rc' check is wrong and execution flow do
'ocfs2_xa_remove_entry(loc);' twice:
* 1st: in ocfs2_xa_cleanup_value_truncate();
* 2nd: returning back to ocfs2_xa_remove() instead of going to 'out'.

Fix this by skipping the 2nd removal of the same entry and making
syzkaller repro happy.</Note>
    </Notes>
    <CVE>CVE-2024-50265</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50265.html</URL>
        <Description>CVE-2024-50265</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233454</URL>
        <Description>SUSE Bug 1233454</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="202">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

USB: serial: io_edgeport: fix use after free in debug printk

The "dev_dbg(&amp;urb-&gt;dev-&gt;dev, ..." which happens after usb_free_urb(urb)
is a use after free of the "urb" pointer.  Store the "dev" pointer at the
start of the function to avoid this issue.</Note>
    </Notes>
    <CVE>CVE-2024-50267</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50267.html</URL>
        <Description>CVE-2024-50267</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233456</URL>
        <Description>SUSE Bug 1233456</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233711</URL>
        <Description>SUSE Bug 1233711</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="203">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()

The "*cmd" variable can be controlled by the user via debugfs.  That means
"new_cam" can be as high as 255 while the size of the uc-&gt;updated[] array
is UCSI_MAX_ALTMODES (30).

The call tree is:
ucsi_cmd() // val comes from simple_attr_write_xsigned()
-&gt; ucsi_send_command()
   -&gt; ucsi_send_command_common()
      -&gt; ucsi_run_command() // calls ucsi-&gt;ops-&gt;sync_control()
         -&gt; ucsi_ccg_sync_control()</Note>
    </Notes>
    <CVE>CVE-2024-50268</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50268.html</URL>
        <Description>CVE-2024-50268</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233457</URL>
        <Description>SUSE Bug 1233457</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="204">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

usb: musb: sunxi: Fix accessing an released usb phy

Commit 6ed05c68cbca ("usb: musb: sunxi: Explicitly release USB PHY on
exit") will cause that usb phy @glue-&gt;xceiv is accessed after released.

1) register platform driver @sunxi_musb_driver
// get the usb phy @glue-&gt;xceiv
sunxi_musb_probe() -&gt; devm_usb_get_phy().

2) register and unregister platform driver @musb_driver
musb_probe() -&gt; sunxi_musb_init()
use the phy here
//the phy is released here
musb_remove() -&gt; sunxi_musb_exit() -&gt; devm_usb_put_phy()

3) register @musb_driver again
musb_probe() -&gt; sunxi_musb_init()
use the phy here but the phy has been released at 2).
...

Fixed by reverting the commit, namely, removing devm_usb_put_phy()
from sunxi_musb_exit().</Note>
    </Notes>
    <CVE>CVE-2024-50269</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50269.html</URL>
        <Description>CVE-2024-50269</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233458</URL>
        <Description>SUSE Bug 1233458</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="205">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

signal: restore the override_rlimit logic

Prior to commit d64696905554 ("Reimplement RLIMIT_SIGPENDING on top of
ucounts") UCOUNT_RLIMIT_SIGPENDING rlimit was not enforced for a class of
signals.  However now it's enforced unconditionally, even if
override_rlimit is set.  This behavior change caused production issues.  

For example, if the limit is reached and a process receives a SIGSEGV
signal, sigqueue_alloc fails to allocate the necessary resources for the
signal delivery, preventing the signal from being delivered with siginfo. 
This prevents the process from correctly identifying the fault address and
handling the error.  From the user-space perspective, applications are
unaware that the limit has been reached and that the siginfo is
effectively 'corrupted'.  This can lead to unpredictable behavior and
crashes, as we observed with java applications.

Fix this by passing override_rlimit into inc_rlimit_get_ucounts() and skip
the comparison to max there if override_rlimit is set.  This effectively
restores the old behavior.</Note>
    </Notes>
    <CVE>CVE-2024-50271</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50271.html</URL>
        <Description>CVE-2024-50271</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233460</URL>
        <Description>SUSE Bug 1233460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="206">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

btrfs: reinitialize delayed ref list after deleting it from the list

At insert_delayed_ref() if we need to update the action of an existing
ref to BTRFS_DROP_DELAYED_REF, we delete the ref from its ref head's
ref_add_list using list_del(), which leaves the ref's add_list member
not reinitialized, as list_del() sets the next and prev members of the
list to LIST_POISON1 and LIST_POISON2, respectively.

If later we end up calling drop_delayed_ref() against the ref, which can
happen during merging or when destroying delayed refs due to a transaction
abort, we can trigger a crash since at drop_delayed_ref() we call
list_empty() against the ref's add_list, which returns false since
the list was not reinitialized after the list_del() and as a consequence
we call list_del() again at drop_delayed_ref(). This results in an
invalid list access since the next and prev members are set to poison
pointers, resulting in a splat if CONFIG_LIST_HARDENED and
CONFIG_DEBUG_LIST are set or invalid poison pointer dereferences
otherwise.

So fix this by deleting from the list with list_del_init() instead.</Note>
    </Notes>
    <CVE>CVE-2024-50273</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50273.html</URL>
        <Description>CVE-2024-50273</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233462</URL>
        <Description>SUSE Bug 1233462</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="207">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

idpf: avoid vport access in idpf_get_link_ksettings

When the device control plane is removed or the platform
running device control plane is rebooted, a reset is detected
on the driver. On driver reset, it releases the resources and
waits for the reset to complete. If the reset fails, it takes
the error path and releases the vport lock. At this time if the
monitoring tools tries to access link settings, it call traces
for accessing released vport pointer.

To avoid it, move link_speed_mbps to netdev_priv structure
which removes the dependency on vport pointer and the vport lock
in idpf_get_link_ksettings. Also use netif_carrier_ok()
to check the link status and adjust the offsetof to use link_up
instead of link_speed_mbps.</Note>
    </Notes>
    <CVE>CVE-2024-50274</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50274.html</URL>
        <Description>CVE-2024-50274</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233463</URL>
        <Description>SUSE Bug 1233463</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235104</URL>
        <Description>SUSE Bug 1235104</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="208">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

dm cache: fix out-of-bounds access to the dirty bitset when resizing

dm-cache checks the dirty bits of the cache blocks to be dropped when
shrinking the fast device, but an index bug in bitset iteration causes
out-of-bounds access.

Reproduce steps:

1. create a cache device of 1024 cache blocks (128 bytes dirty bitset)

dmsetup create cmeta --table "0 8192 linear /dev/sdc 0"
dmsetup create cdata --table "0 131072 linear /dev/sdc 8192"
dmsetup create corig --table "0 524288 linear /dev/sdc 262144"
dd if=/dev/zero of=/dev/mapper/cmeta bs=4k count=1 oflag=direct
dmsetup create cache --table "0 524288 cache /dev/mapper/cmeta \
/dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0"

2. shrink the fast device to 512 cache blocks, triggering out-of-bounds
   access to the dirty bitset (offset 0x80)

dmsetup suspend cache
dmsetup reload cdata --table "0 65536 linear /dev/sdc 8192"
dmsetup resume cdata
dmsetup resume cache

KASAN reports:

  BUG: KASAN: vmalloc-out-of-bounds in cache_preresume+0x269/0x7b0
  Read of size 8 at addr ffffc900000f3080 by task dmsetup/131

  (...snip...)
  The buggy address belongs to the virtual mapping at
   [ffffc900000f3000, ffffc900000f5000) created by:
   cache_ctr+0x176a/0x35f0

  (...snip...)
  Memory state around the buggy address:
   ffffc900000f2f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
   ffffc900000f3000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  &gt;ffffc900000f3080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
                     ^
   ffffc900000f3100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
   ffffc900000f3180: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8

Fix by making the index post-incremented.</Note>
    </Notes>
    <CVE>CVE-2024-50279</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50279.html</URL>
        <Description>CVE-2024-50279</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233468</URL>
        <Description>SUSE Bug 1233468</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233708</URL>
        <Description>SUSE Bug 1233708</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="209">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read()

Avoid a possible buffer overflow if size is larger than 4K.

(cherry picked from commit f5d873f5825b40d886d03bd2aede91d4cf002434)</Note>
    </Notes>
    <CVE>CVE-2024-50282</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50282.html</URL>
        <Description>CVE-2024-50282</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233471</URL>
        <Description>SUSE Bug 1233471</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233707</URL>
        <Description>SUSE Bug 1233707</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="210">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

media: v4l2-tpg: prevent the risk of a division by zero

As reported by Coverity, the logic at tpg_precalculate_line()
blindly rescales the buffer even when scaled_witdh is equal to
zero. If this ever happens, this will cause a division by zero.

Instead, add a WARN_ON_ONCE() to trigger such cases and return
without doing any precalculation.</Note>
    </Notes>
    <CVE>CVE-2024-50287</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50287.html</URL>
        <Description>CVE-2024-50287</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233476</URL>
        <Description>SUSE Bug 1233476</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="211">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

media: av7110: fix a spectre vulnerability

As warned by smatch:
	drivers/staging/media/av7110/av7110_ca.c:270 dvb_ca_ioctl() warn: potential spectre issue 'av7110-&gt;ci_slot' [w] (local cap)

There is a spectre-related vulnerability at the code. Fix it.</Note>
    </Notes>
    <CVE>CVE-2024-50289</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50289.html</URL>
        <Description>CVE-2024-50289</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233478</URL>
        <Description>SUSE Bug 1233478</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="212">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

media: cx24116: prevent overflows on SNR calculus

as reported by Coverity, if reading SNR registers fail, a negative
number will be returned, causing an underflow when reading SNR
registers.

Prevent that.</Note>
    </Notes>
    <CVE>CVE-2024-50290</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50290.html</URL>
        <Description>CVE-2024-50290</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225742</URL>
        <Description>SUSE Bug 1225742</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233479</URL>
        <Description>SUSE Bug 1233479</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233681</URL>
        <Description>SUSE Bug 1233681</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="213">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove

In case of error when requesting ctrl_chan DMA channel, ctrl_chan is not
null. So the release of the dma channel leads to the following issue:
[    4.879000] st,stm32-spdifrx 500d0000.audio-controller:
dma_request_slave_channel error -19
[    4.888975] Unable to handle kernel NULL pointer dereference
at virtual address 000000000000003d
[...]
[    5.096577] Call trace:
[    5.099099]  dma_release_channel+0x24/0x100
[    5.103235]  stm32_spdifrx_remove+0x24/0x60 [snd_soc_stm32_spdifrx]
[    5.109494]  stm32_spdifrx_probe+0x320/0x4c4 [snd_soc_stm32_spdifrx]

To avoid this issue, release channel only if the pointer is valid.</Note>
    </Notes>
    <CVE>CVE-2024-50292</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50292.html</URL>
        <Description>CVE-2024-50292</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233481</URL>
        <Description>SUSE Bug 1233481</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="214">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: arc: fix the device for dma_map_single/dma_unmap_single

The ndev-&gt;dev and pdev-&gt;dev aren't the same device, use ndev-&gt;dev.parent
which has dma_mask, ndev-&gt;dev.parent is just pdev-&gt;dev.
Or it would cause the following issue:

[   39.933526] ------------[ cut here ]------------
[   39.938414] WARNING: CPU: 1 PID: 501 at kernel/dma/mapping.c:149 dma_map_page_attrs+0x90/0x1f8</Note>
    </Notes>
    <CVE>CVE-2024-50295</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50295.html</URL>
        <Description>CVE-2024-50295</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233484</URL>
        <Description>SUSE Bug 1233484</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="215">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: enetc: allocate vf_state during PF probes

In the previous implementation, vf_state is allocated memory only when VF
is enabled. However, net_device_ops::ndo_set_vf_mac() may be called before
VF is enabled to configure the MAC address of VF. If this is the case,
enetc_pf_set_vf_mac() will access vf_state, resulting in access to a null
pointer. The simplified error log is as follows.

root@ls1028ardb:~# ip link set eno0 vf 1 mac 00:0c:e7:66:77:89
[  173.543315] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000004
[  173.637254] pc : enetc_pf_set_vf_mac+0x3c/0x80 Message from sy
[  173.641973] lr : do_setlink+0x4a8/0xec8
[  173.732292] Call trace:
[  173.734740]  enetc_pf_set_vf_mac+0x3c/0x80
[  173.738847]  __rtnl_newlink+0x530/0x89c
[  173.742692]  rtnl_newlink+0x50/0x7c
[  173.746189]  rtnetlink_rcv_msg+0x128/0x390
[  173.750298]  netlink_rcv_skb+0x60/0x130
[  173.754145]  rtnetlink_rcv+0x18/0x24
[  173.757731]  netlink_unicast+0x318/0x380
[  173.761665]  netlink_sendmsg+0x17c/0x3c8</Note>
    </Notes>
    <CVE>CVE-2024-50298</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50298.html</URL>
        <Description>CVE-2024-50298</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233487</URL>
        <Description>SUSE Bug 1233487</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="216">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

security/keys: fix slab-out-of-bounds in key_task_permission

KASAN reports an out of bounds read:
BUG: KASAN: slab-out-of-bounds in __kuid_val include/linux/uidgid.h:36
BUG: KASAN: slab-out-of-bounds in uid_eq include/linux/uidgid.h:63 [inline]
BUG: KASAN: slab-out-of-bounds in key_task_permission+0x394/0x410
security/keys/permission.c:54
Read of size 4 at addr ffff88813c3ab618 by task stress-ng/4362

CPU: 2 PID: 4362 Comm: stress-ng Not tainted 5.10.0-14930-gafbffd6c3ede #15
Call Trace:
 __dump_stack lib/dump_stack.c:82 [inline]
 dump_stack+0x107/0x167 lib/dump_stack.c:123
 print_address_description.constprop.0+0x19/0x170 mm/kasan/report.c:400
 __kasan_report.cold+0x6c/0x84 mm/kasan/report.c:560
 kasan_report+0x3a/0x50 mm/kasan/report.c:585
 __kuid_val include/linux/uidgid.h:36 [inline]
 uid_eq include/linux/uidgid.h:63 [inline]
 key_task_permission+0x394/0x410 security/keys/permission.c:54
 search_nested_keyrings+0x90e/0xe90 security/keys/keyring.c:793

This issue was also reported by syzbot.

It can be reproduced by following these steps(more details [1]):
1. Obtain more than 32 inputs that have similar hashes, which ends with the
   pattern '0xxxxxxxe6'.
2. Reboot and add the keys obtained in step 1.

The reproducer demonstrates how this issue happened:
1. In the search_nested_keyrings function, when it iterates through the
   slots in a node(below tag ascend_to_node), if the slot pointer is meta
   and node-&gt;back_pointer != NULL(it means a root), it will proceed to
   descend_to_node. However, there is an exception. If node is the root,
   and one of the slots points to a shortcut, it will be treated as a
   keyring.
2. Whether the ptr is keyring decided by keyring_ptr_is_keyring function.
   However, KEYRING_PTR_SUBTYPE is 0x2UL, the same as
   ASSOC_ARRAY_PTR_SUBTYPE_MASK.
3. When 32 keys with the similar hashes are added to the tree, the ROOT
   has keys with hashes that are not similar (e.g. slot 0) and it splits
   NODE A without using a shortcut. When NODE A is filled with keys that
   all hashes are xxe6, the keys are similar, NODE A will split with a
   shortcut. Finally, it forms the tree as shown below, where slot 6 points
   to a shortcut.

                      NODE A
              +------&gt;+---+
      ROOT    |       | 0 | xxe6
      +---+   |       +---+
 xxxx | 0 | shortcut  :   : xxe6
      +---+   |       +---+
 xxe6 :   :   |       |   | xxe6
      +---+   |       +---+
      | 6 |---+       :   : xxe6
      +---+           +---+
 xxe6 :   :           | f | xxe6
      +---+           +---+
 xxe6 | f |
      +---+

4. As mentioned above, If a slot(slot 6) of the root points to a shortcut,
   it may be mistakenly transferred to a key*, leading to a read
   out-of-bounds read.

To fix this issue, one should jump to descend_to_node if the ptr is a
shortcut, regardless of whether the node is root or not.

[1] https://lore.kernel.org/linux-kernel/1cfa878e-8c7b-4570-8606-21daf5e13ce7@huaweicloud.com/

[jarkko: tweaked the commit message a bit to have an appropriate closes
 tag.]</Note>
    </Notes>
    <CVE>CVE-2024-50301</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50301.html</URL>
        <Description>CVE-2024-50301</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233490</URL>
        <Description>SUSE Bug 1233490</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233680</URL>
        <Description>SUSE Bug 1233680</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="217">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

HID: core: zero-initialize the report buffer

Since the report buffer is used by all kinds of drivers in various ways, let's
zero-initialize it during allocation to make sure that it can't be ever used
to leak kernel memory via specially-crafted report.</Note>
    </Notes>
    <CVE>CVE-2024-50302</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50302.html</URL>
        <Description>CVE-2024-50302</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233491</URL>
        <Description>SUSE Bug 1233491</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233679</URL>
        <Description>SUSE Bug 1233679</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="218">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2024-53052</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53052.html</URL>
        <Description>CVE-2024-53052</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233548</URL>
        <Description>SUSE Bug 1233548</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="219">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2024-53058</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53058.html</URL>
        <Description>CVE-2024-53058</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233552</URL>
        <Description>SUSE Bug 1233552</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="220">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2024-53059</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53059.html</URL>
        <Description>CVE-2024-53059</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233553</URL>
        <Description>SUSE Bug 1233553</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="221">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported

acpi_evaluate_object() may return AE_NOT_FOUND (failure), which
would result in dereferencing buffer.pointer (obj) while being NULL.

Although this case may be unrealistic for the current code, it is
still better to protect against possible bugs.

Bail out also when status is AE_NOT_FOUND.

This fixes 1 FORWARD_NULL issue reported by Coverity
Report: CID 1600951:  Null pointer dereferences  (FORWARD_NULL)

(cherry picked from commit 91c9e221fe2553edf2db71627d8453f083de87a1)</Note>
    </Notes>
    <CVE>CVE-2024-53060</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53060.html</URL>
        <Description>CVE-2024-53060</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233554</URL>
        <Description>SUSE Bug 1233554</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="222">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2024-53061</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53061.html</URL>
        <Description>CVE-2024-53061</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233555</URL>
        <Description>SUSE Bug 1233555</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233621</URL>
        <Description>SUSE Bug 1233621</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="223">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2024-53063</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53063.html</URL>
        <Description>CVE-2024-53063</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225742</URL>
        <Description>SUSE Bug 1225742</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233557</URL>
        <Description>SUSE Bug 1233557</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233619</URL>
        <Description>SUSE Bug 1233619</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="224">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2024-53066</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53066.html</URL>
        <Description>CVE-2024-53066</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233560</URL>
        <Description>SUSE Bug 1233560</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="225">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2024-53068</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53068.html</URL>
        <Description>CVE-2024-53068</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233561</URL>
        <Description>SUSE Bug 1233561</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233618</URL>
        <Description>SUSE Bug 1233618</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="226">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

mm/thp: fix deferred split unqueue naming and locking

Recent changes are putting more pressure on THP deferred split queues:
under load revealing long-standing races, causing list_del corruptions,
"Bad page state"s and worse (I keep BUGs in both of those, so usually
don't get to see how badly they end up without).  The relevant recent
changes being 6.8's mTHP, 6.10's mTHP swapout, and 6.12's mTHP swapin,
improved swap allocation, and underused THP splitting.

Before fixing locking: rename misleading folio_undo_large_rmappable(),
which does not undo large_rmappable, to folio_unqueue_deferred_split(),
which is what it does.  But that and its out-of-line __callee are mm
internals of very limited usability: add comment and WARN_ON_ONCEs to
check usage; and return a bool to say if a deferred split was unqueued,
which can then be used in WARN_ON_ONCEs around safety checks (sparing
callers the arcane conditionals in __folio_unqueue_deferred_split()).

Just omit the folio_unqueue_deferred_split() from free_unref_folios(), all
of whose callers now call it beforehand (and if any forget then bad_page()
will tell) - except for its caller put_pages_list(), which itself no
longer has any callers (and will be deleted separately).

Swapout: mem_cgroup_swapout() has been resetting folio-&gt;memcg_data 0
without checking and unqueueing a THP folio from deferred split list;
which is unfortunate, since the split_queue_lock depends on the memcg
(when memcg is enabled); so swapout has been unqueueing such THPs later,
when freeing the folio, using the pgdat's lock instead: potentially
corrupting the memcg's list.  __remove_mapping() has frozen refcount to 0
here, so no problem with calling folio_unqueue_deferred_split() before
resetting memcg_data.

That goes back to 5.4 commit 87eaceb3faa5 ("mm: thp: make deferred split
shrinker memcg aware"): which included a check on swapcache before adding
to deferred queue, but no check on deferred queue before adding THP to
swapcache.  That worked fine with the usual sequence of events in reclaim
(though there were a couple of rare ways in which a THP on deferred queue
could have been swapped out), but 6.12 commit dafff3f4c850 ("mm: split
underused THPs") avoids splitting underused THPs in reclaim, which makes
swapcache THPs on deferred queue commonplace.

Keep the check on swapcache before adding to deferred queue?  Yes: it is
no longer essential, but preserves the existing behaviour, and is likely
to be a worthwhile optimization (vmstat showed much more traffic on the
queue under swapping load if the check was removed); update its comment.

Memcg-v1 move (deprecated): mem_cgroup_move_account() has been changing
folio-&gt;memcg_data without checking and unqueueing a THP folio from the
deferred list, sometimes corrupting "from" memcg's list, like swapout. 
Refcount is non-zero here, so folio_unqueue_deferred_split() can only be
used in a WARN_ON_ONCE to validate the fix, which must be done earlier:
mem_cgroup_move_charge_pte_range() first try to split the THP (splitting
of course unqueues), or skip it if that fails.  Not ideal, but moving
charge has been requested, and khugepaged should repair the THP later:
nobody wants new custom unqueueing code just for this deprecated case.

The 87eaceb3faa5 commit did have the code to move from one deferred list
to another (but was not conscious of its unsafety while refcount non-0);
but that was removed by 5.6 commit fac0516b5534 ("mm: thp: don't need care
deferred split queue in memcg charge move path"), which argued that the
existence of a PMD mapping guarantees that the THP cannot be on a deferred
list.  As above, false in rare cases, and now commonly false.

Backport to 6.11 should be straightforward.  Earlier backports must take
care that other _deferred_list fixes and dependencies are included.  There
is not a strong case for backports, but they can fix cornercases.</Note>
    </Notes>
    <CVE>CVE-2024-53079</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53079.html</URL>
        <Description>CVE-2024-53079</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233570</URL>
        <Description>SUSE Bug 1233570</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="227">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tpm: Lock TPM chip in tpm_pm_suspend() first

Setting TPM_CHIP_FLAG_SUSPENDED in the end of tpm_pm_suspend() can be racy
according, as this leaves window for tpm_hwrng_read() to be called while
the operation is in progress. The recent bug report gives also evidence of
this behaviour.

Aadress this by locking the TPM chip before checking any chip-&gt;flags both
in tpm_pm_suspend() and tpm_hwrng_read(). Move TPM_CHIP_FLAG_SUSPENDED
check inside tpm_get_random() so that it will be always checked only when
the lock is reserved.</Note>
    </Notes>
    <CVE>CVE-2024-53085</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53085.html</URL>
        <Description>CVE-2024-53085</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233577</URL>
        <Description>SUSE Bug 1233577</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="228">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

i40e: fix race condition by adding filter's intermediate sync state

Fix a race condition in the i40e driver that leads to MAC/VLAN filters
becoming corrupted and leaking. Address the issue that occurs under
heavy load when multiple threads are concurrently modifying MAC/VLAN
filters by setting mac and port VLAN.

1. Thread T0 allocates a filter in i40e_add_filter() within
        i40e_ndo_set_vf_port_vlan().
2. Thread T1 concurrently frees the filter in __i40e_del_filter() within
        i40e_ndo_set_vf_mac().
3. Subsequently, i40e_service_task() calls i40e_sync_vsi_filters(), which
        refers to the already freed filter memory, causing corruption.

Reproduction steps:
1. Spawn multiple VFs.
2. Apply a concurrent heavy load by running parallel operations to change
        MAC addresses on the VFs and change port VLANs on the host.
3. Observe errors in dmesg:
"Error I40E_AQ_RC_ENOSPC adding RX filters on VF XX,
	please set promiscuous on manually for VF XX".

Exact code for stable reproduction Intel can't open-source now.

The fix involves implementing a new intermediate filter state,
I40E_FILTER_NEW_SYNC, for the time when a filter is on a tmp_add_list.
These filters cannot be deleted from the hash list directly but
must be removed using the full process.</Note>
    </Notes>
    <CVE>CVE-2024-53088</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53088.html</URL>
        <Description>CVE-2024-53088</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233580</URL>
        <Description>SUSE Bug 1233580</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="229">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format

This can lead to out of bounds writes since frames of this type were not
taken into account when calculating the size of the frames buffer in
uvc_parse_streaming.</Note>
    </Notes>
    <CVE>CVE-2024-53104</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53104.html</URL>
        <Description>CVE-2024-53104</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234025</URL>
        <Description>SUSE Bug 1234025</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1236783</URL>
        <Description>SUSE Bug 1236783</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="230">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

vp_vdpa: fix id_table array not null terminated error

Allocate one extra virtio_device_id as null terminator, otherwise
vdpa_mgmtdev_get_classes() may iterate multiple times and visit
undefined memory.</Note>
    </Notes>
    <CVE>CVE-2024-53110</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-Azure-3P:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>Image SLES15-SP5-HPC-Azure:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.75.1</ProductID>
        <ProductID>openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.75.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-53110.html</URL>
        <Description>CVE-2024-53110</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234085</URL>
        <Description>SUSE Bug 1234085</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
